Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 18:41

General

  • Target

    9dd70309bf0ea21d0f37336a9bdcfd4a8e995f1c72709870ad20fe0f202cd87e.exe

  • Size

    745KB

  • MD5

    2774c92ea90432a7ce6cd12a855c3f13

  • SHA1

    efbda358509881e633e85972419ae36a2be6c4af

  • SHA256

    9dd70309bf0ea21d0f37336a9bdcfd4a8e995f1c72709870ad20fe0f202cd87e

  • SHA512

    c30f84f7a7c190aed35ff65d9ec35a2f36674d7ff13c1a969e17dbf41bc34e410b6b131e166abeafc7f1327e5e78ae3f18dddf2dc2f8291430f7bb51650e75f0

  • SSDEEP

    12288:Jy90dwt1qq/LcBf8T4xQRn6udYQ0OWn6M4bKmX9+4BtcXUgs+6DNl4:JyojxQJ6HQ0OQ8bCIcXBwD8

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9dd70309bf0ea21d0f37336a9bdcfd4a8e995f1c72709870ad20fe0f202cd87e.exe
    "C:\Users\Admin\AppData\Local\Temp\9dd70309bf0ea21d0f37336a9bdcfd4a8e995f1c72709870ad20fe0f202cd87e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041845.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041845.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87951057.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87951057.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk022169.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk022169.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1548

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041845.exe

          Filesize

          591KB

          MD5

          daf32105efce08f80e4a20ee2e759fee

          SHA1

          7275edd53ffacd83914d15e02db5b3195aeffdc9

          SHA256

          859f01fb8b5c4e4529811c07e53ba9f8c4e2b58f2059f4bb692d0f2c7d7351fb

          SHA512

          ae7df37d8abe52f3713436b7c01d227be9093c1cf84ae7d967b53ad54ae9e0033c964e02388a647fb8a7a5d75974764a23df5f19e9f15b9f2a4d6511cc88161a

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041845.exe

          Filesize

          591KB

          MD5

          daf32105efce08f80e4a20ee2e759fee

          SHA1

          7275edd53ffacd83914d15e02db5b3195aeffdc9

          SHA256

          859f01fb8b5c4e4529811c07e53ba9f8c4e2b58f2059f4bb692d0f2c7d7351fb

          SHA512

          ae7df37d8abe52f3713436b7c01d227be9093c1cf84ae7d967b53ad54ae9e0033c964e02388a647fb8a7a5d75974764a23df5f19e9f15b9f2a4d6511cc88161a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87951057.exe

          Filesize

          376KB

          MD5

          481dad08e5b92e3492fdfefe16ebb39c

          SHA1

          b1bc7947a5d68cf0f5899ee5b6d1b250fd870067

          SHA256

          30d0227cab7dc08455970cc2de2d3d91cc4042f4aadd8f1dcc5aa5c3c4e7ea79

          SHA512

          cfe4c52ba86d1144b13e39e7ee38089097f49ab8175325ff0f85688e5812c90caba282ba3aa9114d0e27312f02ef4256ce67b481de662cbfc33b8110b198cd3d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87951057.exe

          Filesize

          376KB

          MD5

          481dad08e5b92e3492fdfefe16ebb39c

          SHA1

          b1bc7947a5d68cf0f5899ee5b6d1b250fd870067

          SHA256

          30d0227cab7dc08455970cc2de2d3d91cc4042f4aadd8f1dcc5aa5c3c4e7ea79

          SHA512

          cfe4c52ba86d1144b13e39e7ee38089097f49ab8175325ff0f85688e5812c90caba282ba3aa9114d0e27312f02ef4256ce67b481de662cbfc33b8110b198cd3d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87951057.exe

          Filesize

          376KB

          MD5

          481dad08e5b92e3492fdfefe16ebb39c

          SHA1

          b1bc7947a5d68cf0f5899ee5b6d1b250fd870067

          SHA256

          30d0227cab7dc08455970cc2de2d3d91cc4042f4aadd8f1dcc5aa5c3c4e7ea79

          SHA512

          cfe4c52ba86d1144b13e39e7ee38089097f49ab8175325ff0f85688e5812c90caba282ba3aa9114d0e27312f02ef4256ce67b481de662cbfc33b8110b198cd3d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk022169.exe

          Filesize

          459KB

          MD5

          fbd7a03c2b7fac0cb14a6da427694ee7

          SHA1

          f29daa3c4ab4a23890ac69dc5df362cbefaa83b9

          SHA256

          3b237090e6e4abe4e6c0977759a47fa59f81457dec2b8e91759a9332d3b551a0

          SHA512

          c0fba38ff6bab914016fef62d942eefd88b7ee94822ab9445ef16d6301f7b9c220fba818b5714d353f98aa65457c5c561c33c1335778fc590005319cd1476dc0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk022169.exe

          Filesize

          459KB

          MD5

          fbd7a03c2b7fac0cb14a6da427694ee7

          SHA1

          f29daa3c4ab4a23890ac69dc5df362cbefaa83b9

          SHA256

          3b237090e6e4abe4e6c0977759a47fa59f81457dec2b8e91759a9332d3b551a0

          SHA512

          c0fba38ff6bab914016fef62d942eefd88b7ee94822ab9445ef16d6301f7b9c220fba818b5714d353f98aa65457c5c561c33c1335778fc590005319cd1476dc0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk022169.exe

          Filesize

          459KB

          MD5

          fbd7a03c2b7fac0cb14a6da427694ee7

          SHA1

          f29daa3c4ab4a23890ac69dc5df362cbefaa83b9

          SHA256

          3b237090e6e4abe4e6c0977759a47fa59f81457dec2b8e91759a9332d3b551a0

          SHA512

          c0fba38ff6bab914016fef62d942eefd88b7ee94822ab9445ef16d6301f7b9c220fba818b5714d353f98aa65457c5c561c33c1335778fc590005319cd1476dc0

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un041845.exe

          Filesize

          591KB

          MD5

          daf32105efce08f80e4a20ee2e759fee

          SHA1

          7275edd53ffacd83914d15e02db5b3195aeffdc9

          SHA256

          859f01fb8b5c4e4529811c07e53ba9f8c4e2b58f2059f4bb692d0f2c7d7351fb

          SHA512

          ae7df37d8abe52f3713436b7c01d227be9093c1cf84ae7d967b53ad54ae9e0033c964e02388a647fb8a7a5d75974764a23df5f19e9f15b9f2a4d6511cc88161a

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un041845.exe

          Filesize

          591KB

          MD5

          daf32105efce08f80e4a20ee2e759fee

          SHA1

          7275edd53ffacd83914d15e02db5b3195aeffdc9

          SHA256

          859f01fb8b5c4e4529811c07e53ba9f8c4e2b58f2059f4bb692d0f2c7d7351fb

          SHA512

          ae7df37d8abe52f3713436b7c01d227be9093c1cf84ae7d967b53ad54ae9e0033c964e02388a647fb8a7a5d75974764a23df5f19e9f15b9f2a4d6511cc88161a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\87951057.exe

          Filesize

          376KB

          MD5

          481dad08e5b92e3492fdfefe16ebb39c

          SHA1

          b1bc7947a5d68cf0f5899ee5b6d1b250fd870067

          SHA256

          30d0227cab7dc08455970cc2de2d3d91cc4042f4aadd8f1dcc5aa5c3c4e7ea79

          SHA512

          cfe4c52ba86d1144b13e39e7ee38089097f49ab8175325ff0f85688e5812c90caba282ba3aa9114d0e27312f02ef4256ce67b481de662cbfc33b8110b198cd3d

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\87951057.exe

          Filesize

          376KB

          MD5

          481dad08e5b92e3492fdfefe16ebb39c

          SHA1

          b1bc7947a5d68cf0f5899ee5b6d1b250fd870067

          SHA256

          30d0227cab7dc08455970cc2de2d3d91cc4042f4aadd8f1dcc5aa5c3c4e7ea79

          SHA512

          cfe4c52ba86d1144b13e39e7ee38089097f49ab8175325ff0f85688e5812c90caba282ba3aa9114d0e27312f02ef4256ce67b481de662cbfc33b8110b198cd3d

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\87951057.exe

          Filesize

          376KB

          MD5

          481dad08e5b92e3492fdfefe16ebb39c

          SHA1

          b1bc7947a5d68cf0f5899ee5b6d1b250fd870067

          SHA256

          30d0227cab7dc08455970cc2de2d3d91cc4042f4aadd8f1dcc5aa5c3c4e7ea79

          SHA512

          cfe4c52ba86d1144b13e39e7ee38089097f49ab8175325ff0f85688e5812c90caba282ba3aa9114d0e27312f02ef4256ce67b481de662cbfc33b8110b198cd3d

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk022169.exe

          Filesize

          459KB

          MD5

          fbd7a03c2b7fac0cb14a6da427694ee7

          SHA1

          f29daa3c4ab4a23890ac69dc5df362cbefaa83b9

          SHA256

          3b237090e6e4abe4e6c0977759a47fa59f81457dec2b8e91759a9332d3b551a0

          SHA512

          c0fba38ff6bab914016fef62d942eefd88b7ee94822ab9445ef16d6301f7b9c220fba818b5714d353f98aa65457c5c561c33c1335778fc590005319cd1476dc0

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk022169.exe

          Filesize

          459KB

          MD5

          fbd7a03c2b7fac0cb14a6da427694ee7

          SHA1

          f29daa3c4ab4a23890ac69dc5df362cbefaa83b9

          SHA256

          3b237090e6e4abe4e6c0977759a47fa59f81457dec2b8e91759a9332d3b551a0

          SHA512

          c0fba38ff6bab914016fef62d942eefd88b7ee94822ab9445ef16d6301f7b9c220fba818b5714d353f98aa65457c5c561c33c1335778fc590005319cd1476dc0

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk022169.exe

          Filesize

          459KB

          MD5

          fbd7a03c2b7fac0cb14a6da427694ee7

          SHA1

          f29daa3c4ab4a23890ac69dc5df362cbefaa83b9

          SHA256

          3b237090e6e4abe4e6c0977759a47fa59f81457dec2b8e91759a9332d3b551a0

          SHA512

          c0fba38ff6bab914016fef62d942eefd88b7ee94822ab9445ef16d6301f7b9c220fba818b5714d353f98aa65457c5c561c33c1335778fc590005319cd1476dc0

        • memory/1496-87-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-89-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-91-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-93-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-95-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-97-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-99-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-101-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-103-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-105-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-107-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-110-0x0000000004F30000-0x0000000004F70000-memory.dmp

          Filesize

          256KB

        • memory/1496-109-0x0000000004F30000-0x0000000004F70000-memory.dmp

          Filesize

          256KB

        • memory/1496-108-0x00000000003D0000-0x00000000003FD000-memory.dmp

          Filesize

          180KB

        • memory/1496-111-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/1496-112-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/1496-85-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-83-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-81-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-80-0x0000000000D70000-0x0000000000D82000-memory.dmp

          Filesize

          72KB

        • memory/1496-79-0x0000000000D70000-0x0000000000D88000-memory.dmp

          Filesize

          96KB

        • memory/1496-78-0x0000000000C60000-0x0000000000C7A000-memory.dmp

          Filesize

          104KB

        • memory/1548-124-0x0000000000E60000-0x0000000000E9A000-memory.dmp

          Filesize

          232KB

        • memory/1548-146-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-125-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-126-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-128-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-130-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-132-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-134-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-136-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-138-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-140-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-142-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-144-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-123-0x0000000000AA0000-0x0000000000ADC000-memory.dmp

          Filesize

          240KB

        • memory/1548-148-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-150-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-152-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-154-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-156-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-158-0x0000000000E60000-0x0000000000E95000-memory.dmp

          Filesize

          212KB

        • memory/1548-577-0x00000000002D0000-0x0000000000316000-memory.dmp

          Filesize

          280KB

        • memory/1548-579-0x00000000050C0000-0x0000000005100000-memory.dmp

          Filesize

          256KB

        • memory/1548-581-0x00000000050C0000-0x0000000005100000-memory.dmp

          Filesize

          256KB

        • memory/1548-920-0x00000000050C0000-0x0000000005100000-memory.dmp

          Filesize

          256KB

        • memory/1548-922-0x00000000050C0000-0x0000000005100000-memory.dmp

          Filesize

          256KB

        • memory/1548-923-0x00000000050C0000-0x0000000005100000-memory.dmp

          Filesize

          256KB