Analysis

  • max time kernel
    142s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 18:41

General

  • Target

    9d8e2b7fe96f5fac74717f3c3eddd7a3348294a0ab34a7850dba7879b9eaca09.exe

  • Size

    651KB

  • MD5

    bc7af4eeda3ba6cdc19bf6ab20393253

  • SHA1

    8625756e9f1913ed58f3dc01c67ca1a20433e406

  • SHA256

    9d8e2b7fe96f5fac74717f3c3eddd7a3348294a0ab34a7850dba7879b9eaca09

  • SHA512

    e861e090b440c8c293da3f0da02d98a1b1d19a67388850795b567eda2e5b8674a75dcc88294d66d5059f2eefadc11f35b47792de4e02c41ed58b9baf01e43e3d

  • SSDEEP

    12288:8y90SAgLHtmU2ptJ/Pxug6iJ4y/n0l//28mQWnvyYU:8yFxJ2ptJ/PxugnUX285WnvyYU

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d8e2b7fe96f5fac74717f3c3eddd7a3348294a0ab34a7850dba7879b9eaca09.exe
    "C:\Users\Admin\AppData\Local\Temp\9d8e2b7fe96f5fac74717f3c3eddd7a3348294a0ab34a7850dba7879b9eaca09.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:920

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe

    Filesize

    497KB

    MD5

    0bf36d1dfb33416b731b2551fd3aa99f

    SHA1

    7236143b697cdafc0dd33bca3b37545e09e9ee73

    SHA256

    6e11d2b17a85a9a7fa88a801cd10252d3d3539245e6df45ae7d4ecf07a06d1d7

    SHA512

    0101b703f72fcd389a0196535b1420aaca3ac8c4e90a7bcaa2463931fcbe106547720e211c5a556227a13b9dc16ff8c46f9676fa6d8e2ae701739b7e8a75aa1f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe

    Filesize

    497KB

    MD5

    0bf36d1dfb33416b731b2551fd3aa99f

    SHA1

    7236143b697cdafc0dd33bca3b37545e09e9ee73

    SHA256

    6e11d2b17a85a9a7fa88a801cd10252d3d3539245e6df45ae7d4ecf07a06d1d7

    SHA512

    0101b703f72fcd389a0196535b1420aaca3ac8c4e90a7bcaa2463931fcbe106547720e211c5a556227a13b9dc16ff8c46f9676fa6d8e2ae701739b7e8a75aa1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe

    Filesize

    497KB

    MD5

    0bf36d1dfb33416b731b2551fd3aa99f

    SHA1

    7236143b697cdafc0dd33bca3b37545e09e9ee73

    SHA256

    6e11d2b17a85a9a7fa88a801cd10252d3d3539245e6df45ae7d4ecf07a06d1d7

    SHA512

    0101b703f72fcd389a0196535b1420aaca3ac8c4e90a7bcaa2463931fcbe106547720e211c5a556227a13b9dc16ff8c46f9676fa6d8e2ae701739b7e8a75aa1f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe

    Filesize

    497KB

    MD5

    0bf36d1dfb33416b731b2551fd3aa99f

    SHA1

    7236143b697cdafc0dd33bca3b37545e09e9ee73

    SHA256

    6e11d2b17a85a9a7fa88a801cd10252d3d3539245e6df45ae7d4ecf07a06d1d7

    SHA512

    0101b703f72fcd389a0196535b1420aaca3ac8c4e90a7bcaa2463931fcbe106547720e211c5a556227a13b9dc16ff8c46f9676fa6d8e2ae701739b7e8a75aa1f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • memory/460-81-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-80-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-83-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-85-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-87-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-89-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-91-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-93-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-95-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-97-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-99-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-101-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-103-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-105-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-107-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-79-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/460-78-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/460-77-0x0000000000B20000-0x0000000000B38000-memory.dmp

    Filesize

    96KB

  • memory/460-76-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/460-75-0x0000000000310000-0x000000000032A000-memory.dmp

    Filesize

    104KB

  • memory/460-74-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/920-120-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-141-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-118-0x0000000002470000-0x00000000024AC000-memory.dmp

    Filesize

    240KB

  • memory/920-121-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-123-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-125-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-129-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-127-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-131-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-133-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-135-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-137-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-139-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-119-0x00000000024B0000-0x00000000024EA000-memory.dmp

    Filesize

    232KB

  • memory/920-143-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-145-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-148-0x00000000008C0000-0x0000000000906000-memory.dmp

    Filesize

    280KB

  • memory/920-151-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-150-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/920-147-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-153-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-155-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-157-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-915-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/920-916-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/920-918-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB