Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 18:50

General

  • Target

    a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe

  • Size

    674KB

  • MD5

    57010affc0dc3cfded0cb04b499857ca

  • SHA1

    7bc7c28e0dca80c0f33274d05b710be6e19b0d99

  • SHA256

    a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4

  • SHA512

    b6a367528798a1c04b530bf936e1b144b867cd1ef237effd9c12275fcfc3bac7fbacd6fdfc34804ba9a0a950df69abd505fe09cffe28cd51b6c63b2ee15fea12

  • SSDEEP

    12288:oy90FtWi7tJaPcMaF+9rfq3f5P9fBPVtWDyVjqGOtzI:oystWi7tJaPmkS3fh9LtkyIlI

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe
    "C:\Users\Admin\AppData\Local\Temp\a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st237151.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st237151.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53914821.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53914821.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp018076.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp018076.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st237151.exe

    Filesize

    520KB

    MD5

    c3c623acfcb13bebef91d25db9db3af8

    SHA1

    9cb545076de899e0d6574f7269fd2dd58c54ae60

    SHA256

    6fa01861ccb17bb28083dbe1a26e8a08085d3c3b0226793ae63c20dbed472569

    SHA512

    24f55582853da26a541550ee7386dc95a7e583ae73398d3059b4871bce8926f40072d06545b4b16a0dea5975730a32dfce6aea33fd1b95149e2afd76e1c42e70

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st237151.exe

    Filesize

    520KB

    MD5

    c3c623acfcb13bebef91d25db9db3af8

    SHA1

    9cb545076de899e0d6574f7269fd2dd58c54ae60

    SHA256

    6fa01861ccb17bb28083dbe1a26e8a08085d3c3b0226793ae63c20dbed472569

    SHA512

    24f55582853da26a541550ee7386dc95a7e583ae73398d3059b4871bce8926f40072d06545b4b16a0dea5975730a32dfce6aea33fd1b95149e2afd76e1c42e70

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53914821.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53914821.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp018076.exe

    Filesize

    416KB

    MD5

    bf66208d7f588ae760bcac6be9690508

    SHA1

    788158d62adec2e66462650f7181f59ecdc8d3f6

    SHA256

    c4a8e80e305014533d5ae82ce082a039423831761b1f5326dc93ce94eac27331

    SHA512

    f8ade36927262f9c4777823fc0c27c3c251036e81369f8594b82e339b365f17e023c7595d3c68b8d945bafa57e21a8af15ac3d58fc5dcac33ce3e9560010f2fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp018076.exe

    Filesize

    416KB

    MD5

    bf66208d7f588ae760bcac6be9690508

    SHA1

    788158d62adec2e66462650f7181f59ecdc8d3f6

    SHA256

    c4a8e80e305014533d5ae82ce082a039423831761b1f5326dc93ce94eac27331

    SHA512

    f8ade36927262f9c4777823fc0c27c3c251036e81369f8594b82e339b365f17e023c7595d3c68b8d945bafa57e21a8af15ac3d58fc5dcac33ce3e9560010f2fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp018076.exe

    Filesize

    416KB

    MD5

    bf66208d7f588ae760bcac6be9690508

    SHA1

    788158d62adec2e66462650f7181f59ecdc8d3f6

    SHA256

    c4a8e80e305014533d5ae82ce082a039423831761b1f5326dc93ce94eac27331

    SHA512

    f8ade36927262f9c4777823fc0c27c3c251036e81369f8594b82e339b365f17e023c7595d3c68b8d945bafa57e21a8af15ac3d58fc5dcac33ce3e9560010f2fd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st237151.exe

    Filesize

    520KB

    MD5

    c3c623acfcb13bebef91d25db9db3af8

    SHA1

    9cb545076de899e0d6574f7269fd2dd58c54ae60

    SHA256

    6fa01861ccb17bb28083dbe1a26e8a08085d3c3b0226793ae63c20dbed472569

    SHA512

    24f55582853da26a541550ee7386dc95a7e583ae73398d3059b4871bce8926f40072d06545b4b16a0dea5975730a32dfce6aea33fd1b95149e2afd76e1c42e70

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st237151.exe

    Filesize

    520KB

    MD5

    c3c623acfcb13bebef91d25db9db3af8

    SHA1

    9cb545076de899e0d6574f7269fd2dd58c54ae60

    SHA256

    6fa01861ccb17bb28083dbe1a26e8a08085d3c3b0226793ae63c20dbed472569

    SHA512

    24f55582853da26a541550ee7386dc95a7e583ae73398d3059b4871bce8926f40072d06545b4b16a0dea5975730a32dfce6aea33fd1b95149e2afd76e1c42e70

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\53914821.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\53914821.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp018076.exe

    Filesize

    416KB

    MD5

    bf66208d7f588ae760bcac6be9690508

    SHA1

    788158d62adec2e66462650f7181f59ecdc8d3f6

    SHA256

    c4a8e80e305014533d5ae82ce082a039423831761b1f5326dc93ce94eac27331

    SHA512

    f8ade36927262f9c4777823fc0c27c3c251036e81369f8594b82e339b365f17e023c7595d3c68b8d945bafa57e21a8af15ac3d58fc5dcac33ce3e9560010f2fd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp018076.exe

    Filesize

    416KB

    MD5

    bf66208d7f588ae760bcac6be9690508

    SHA1

    788158d62adec2e66462650f7181f59ecdc8d3f6

    SHA256

    c4a8e80e305014533d5ae82ce082a039423831761b1f5326dc93ce94eac27331

    SHA512

    f8ade36927262f9c4777823fc0c27c3c251036e81369f8594b82e339b365f17e023c7595d3c68b8d945bafa57e21a8af15ac3d58fc5dcac33ce3e9560010f2fd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp018076.exe

    Filesize

    416KB

    MD5

    bf66208d7f588ae760bcac6be9690508

    SHA1

    788158d62adec2e66462650f7181f59ecdc8d3f6

    SHA256

    c4a8e80e305014533d5ae82ce082a039423831761b1f5326dc93ce94eac27331

    SHA512

    f8ade36927262f9c4777823fc0c27c3c251036e81369f8594b82e339b365f17e023c7595d3c68b8d945bafa57e21a8af15ac3d58fc5dcac33ce3e9560010f2fd

  • memory/432-81-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-83-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-85-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-87-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-89-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-91-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-93-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-95-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-97-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-99-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-101-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-103-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-105-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-79-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-78-0x0000000001EA0000-0x0000000001EB3000-memory.dmp

    Filesize

    76KB

  • memory/432-76-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/432-77-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/432-75-0x0000000001EA0000-0x0000000001EB8000-memory.dmp

    Filesize

    96KB

  • memory/432-74-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/1420-118-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-135-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-116-0x00000000020D0000-0x000000000210C000-memory.dmp

    Filesize

    240KB

  • memory/1420-121-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-119-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-123-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-125-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-127-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-129-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-131-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-133-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-117-0x0000000002250000-0x000000000228A000-memory.dmp

    Filesize

    232KB

  • memory/1420-137-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-139-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-141-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-143-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-145-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-147-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-149-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-151-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-153-0x0000000002250000-0x0000000002285000-memory.dmp

    Filesize

    212KB

  • memory/1420-533-0x00000000007F0000-0x0000000000836000-memory.dmp

    Filesize

    280KB

  • memory/1420-535-0x0000000004A40000-0x0000000004A80000-memory.dmp

    Filesize

    256KB

  • memory/1420-913-0x0000000004A40000-0x0000000004A80000-memory.dmp

    Filesize

    256KB