Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 19:25

General

  • Target

    c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe

  • Size

    618KB

  • MD5

    fbbfc72515bcc374e573cf83dda6aead

  • SHA1

    8b508f14f9771ff3d3e6061de71e4232990cd2cf

  • SHA256

    c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e

  • SHA512

    266ecf90d81776e94f6f6871347442c94e40d515024ac607b901b56f1314446a2e1a8a8170e7d930a02b15a8f00973ca913c8bc696acfb4e10d9b78af101dc5b

  • SSDEEP

    12288:Gy90Prxou5coojwCcbUe4PfeIKeRHcUNPLgy+YvI7UwcB:Gy6xou5coywJU3PGb0kY6cB

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe
    "C:\Users\Admin\AppData\Local\Temp\c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st835578.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st835578.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\63916605.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\63916605.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:704
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp919382.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp919382.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st835578.exe

    Filesize

    463KB

    MD5

    bf9df9321f7875df2b617e89ab00b363

    SHA1

    203756db6672475c91bdf641ed5093de45ff880d

    SHA256

    ab44dd5b2bdc2abb6ebf8bfbf32ca9607c4295fd909fe72078471aa8ad67e04f

    SHA512

    a81403dd6fa50c4152e7bb0592454e716c7d3b11121cf4c2893269b36d7e466a7189b12392ec2bdf2eafdd2328dbb59cbab44676718bf7b4452bec5b9f7a21db

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st835578.exe

    Filesize

    463KB

    MD5

    bf9df9321f7875df2b617e89ab00b363

    SHA1

    203756db6672475c91bdf641ed5093de45ff880d

    SHA256

    ab44dd5b2bdc2abb6ebf8bfbf32ca9607c4295fd909fe72078471aa8ad67e04f

    SHA512

    a81403dd6fa50c4152e7bb0592454e716c7d3b11121cf4c2893269b36d7e466a7189b12392ec2bdf2eafdd2328dbb59cbab44676718bf7b4452bec5b9f7a21db

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\63916605.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\63916605.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp919382.exe

    Filesize

    478KB

    MD5

    8065dd22ab3862ca99117f6e62238c2d

    SHA1

    cecf50ee792ac18a9a47708d4add45ebbdab1b78

    SHA256

    6b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27

    SHA512

    47fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp919382.exe

    Filesize

    478KB

    MD5

    8065dd22ab3862ca99117f6e62238c2d

    SHA1

    cecf50ee792ac18a9a47708d4add45ebbdab1b78

    SHA256

    6b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27

    SHA512

    47fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp919382.exe

    Filesize

    478KB

    MD5

    8065dd22ab3862ca99117f6e62238c2d

    SHA1

    cecf50ee792ac18a9a47708d4add45ebbdab1b78

    SHA256

    6b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27

    SHA512

    47fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st835578.exe

    Filesize

    463KB

    MD5

    bf9df9321f7875df2b617e89ab00b363

    SHA1

    203756db6672475c91bdf641ed5093de45ff880d

    SHA256

    ab44dd5b2bdc2abb6ebf8bfbf32ca9607c4295fd909fe72078471aa8ad67e04f

    SHA512

    a81403dd6fa50c4152e7bb0592454e716c7d3b11121cf4c2893269b36d7e466a7189b12392ec2bdf2eafdd2328dbb59cbab44676718bf7b4452bec5b9f7a21db

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st835578.exe

    Filesize

    463KB

    MD5

    bf9df9321f7875df2b617e89ab00b363

    SHA1

    203756db6672475c91bdf641ed5093de45ff880d

    SHA256

    ab44dd5b2bdc2abb6ebf8bfbf32ca9607c4295fd909fe72078471aa8ad67e04f

    SHA512

    a81403dd6fa50c4152e7bb0592454e716c7d3b11121cf4c2893269b36d7e466a7189b12392ec2bdf2eafdd2328dbb59cbab44676718bf7b4452bec5b9f7a21db

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\63916605.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp919382.exe

    Filesize

    478KB

    MD5

    8065dd22ab3862ca99117f6e62238c2d

    SHA1

    cecf50ee792ac18a9a47708d4add45ebbdab1b78

    SHA256

    6b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27

    SHA512

    47fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp919382.exe

    Filesize

    478KB

    MD5

    8065dd22ab3862ca99117f6e62238c2d

    SHA1

    cecf50ee792ac18a9a47708d4add45ebbdab1b78

    SHA256

    6b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27

    SHA512

    47fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp919382.exe

    Filesize

    478KB

    MD5

    8065dd22ab3862ca99117f6e62238c2d

    SHA1

    cecf50ee792ac18a9a47708d4add45ebbdab1b78

    SHA256

    6b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27

    SHA512

    47fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999

  • memory/368-104-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-117-0x0000000000250000-0x0000000000296000-memory.dmp

    Filesize

    280KB

  • memory/368-84-0x0000000002660000-0x000000000269A000-memory.dmp

    Filesize

    232KB

  • memory/368-85-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-86-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-88-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-90-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-92-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-94-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-96-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-98-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-100-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-102-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-882-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/368-106-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-108-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-110-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-112-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-114-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-83-0x00000000025C0000-0x00000000025FC000-memory.dmp

    Filesize

    240KB

  • memory/368-119-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/368-120-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-116-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-122-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-124-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-126-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-128-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-130-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-132-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-134-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-136-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-146-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-144-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-142-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-140-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-148-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-138-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-150-0x0000000002660000-0x0000000002695000-memory.dmp

    Filesize

    212KB

  • memory/368-879-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/704-72-0x0000000000AC0000-0x0000000000ACA000-memory.dmp

    Filesize

    40KB