Analysis

  • max time kernel
    224s
  • max time network
    311s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 18:57

General

  • Target

    ace943288cf51105b08d361d8169ab401ae21d20d7f6041130e2658547629bcb.exe

  • Size

    752KB

  • MD5

    6dcc771778f7c089a3ee4ae7305ebcce

  • SHA1

    a2cb1a0b844dc6df45c5ed7bd9b09c6e04070707

  • SHA256

    ace943288cf51105b08d361d8169ab401ae21d20d7f6041130e2658547629bcb

  • SHA512

    6c0e40b6d6bd6d4756a25454332de0cf753d3149c6cc054ae29f4954fcdf7100ccbed2d0bee85e91b3e065aa114d93e8ef803a298711c7e5d678211c542ef64c

  • SSDEEP

    12288:ny90nI7pNanUkzIejb4kgUeuEn/cDlTBa4il7Mg+EOum6xdpXwWA6VRXWk8I0oD:nyEwpSfzfjbXuvn0BI4iaHrumsvXgCcC

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ace943288cf51105b08d361d8169ab401ae21d20d7f6041130e2658547629bcb.exe
    "C:\Users\Admin\AppData\Local\Temp\ace943288cf51105b08d361d8169ab401ae21d20d7f6041130e2658547629bcb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un012154.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un012154.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1308

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un012154.exe

    Filesize

    598KB

    MD5

    afeb3b1b00dc6993d135e312f3166e51

    SHA1

    988637ba75f00e1ad91210f4e80acb70c4a46aec

    SHA256

    b9b27015c35d8d65721d338a5e52ffdef0ae18277d04a395ae2564f7ccb7f60c

    SHA512

    acc503aa5e8331db9d86811c72fbbb9326a28610627a0c75ae4daba6cd02e3f6d14b15fdc2e078ca43de350d5a49b5f6a83110c52ee82e4cac597757b4b1215c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un012154.exe

    Filesize

    598KB

    MD5

    afeb3b1b00dc6993d135e312f3166e51

    SHA1

    988637ba75f00e1ad91210f4e80acb70c4a46aec

    SHA256

    b9b27015c35d8d65721d338a5e52ffdef0ae18277d04a395ae2564f7ccb7f60c

    SHA512

    acc503aa5e8331db9d86811c72fbbb9326a28610627a0c75ae4daba6cd02e3f6d14b15fdc2e078ca43de350d5a49b5f6a83110c52ee82e4cac597757b4b1215c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe

    Filesize

    390KB

    MD5

    acd26f7d98a58d8833a99ddc8c035d7b

    SHA1

    958c8de1d125548b0bdcccde4a62fa30767e33af

    SHA256

    49ceac6965494d52c5a9bf8ccf9d5ddf8b882321aeee6a9722613583bd1db313

    SHA512

    f43c6ace4cd872feba2fd1c1bd21faadd9b6bef4360e22af2379af7aa293e5d7266f8c0563f0290c8a59eea1efa3b6ee6e0db2d81218ff640baa1d4141f862b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe

    Filesize

    390KB

    MD5

    acd26f7d98a58d8833a99ddc8c035d7b

    SHA1

    958c8de1d125548b0bdcccde4a62fa30767e33af

    SHA256

    49ceac6965494d52c5a9bf8ccf9d5ddf8b882321aeee6a9722613583bd1db313

    SHA512

    f43c6ace4cd872feba2fd1c1bd21faadd9b6bef4360e22af2379af7aa293e5d7266f8c0563f0290c8a59eea1efa3b6ee6e0db2d81218ff640baa1d4141f862b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe

    Filesize

    390KB

    MD5

    acd26f7d98a58d8833a99ddc8c035d7b

    SHA1

    958c8de1d125548b0bdcccde4a62fa30767e33af

    SHA256

    49ceac6965494d52c5a9bf8ccf9d5ddf8b882321aeee6a9722613583bd1db313

    SHA512

    f43c6ace4cd872feba2fd1c1bd21faadd9b6bef4360e22af2379af7aa293e5d7266f8c0563f0290c8a59eea1efa3b6ee6e0db2d81218ff640baa1d4141f862b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe

    Filesize

    473KB

    MD5

    2d2b724b11505d2df5d0ee9499a847e5

    SHA1

    7b2d9e070ab7f39d268c4c0b6eb7418c96ea8b8a

    SHA256

    d6e70034b1f18f4290aa7430539689ad42dcc2912426fb5da7c198218ea97899

    SHA512

    5c7ee47fcf75bd5f8d436ad2c595f94cd865e35339939cf5637d11695202fbd5e127b4aa527d0f4bdefa31b0b983631eb09f39f342d3ca80693c8bfaeb897b8f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe

    Filesize

    473KB

    MD5

    2d2b724b11505d2df5d0ee9499a847e5

    SHA1

    7b2d9e070ab7f39d268c4c0b6eb7418c96ea8b8a

    SHA256

    d6e70034b1f18f4290aa7430539689ad42dcc2912426fb5da7c198218ea97899

    SHA512

    5c7ee47fcf75bd5f8d436ad2c595f94cd865e35339939cf5637d11695202fbd5e127b4aa527d0f4bdefa31b0b983631eb09f39f342d3ca80693c8bfaeb897b8f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe

    Filesize

    473KB

    MD5

    2d2b724b11505d2df5d0ee9499a847e5

    SHA1

    7b2d9e070ab7f39d268c4c0b6eb7418c96ea8b8a

    SHA256

    d6e70034b1f18f4290aa7430539689ad42dcc2912426fb5da7c198218ea97899

    SHA512

    5c7ee47fcf75bd5f8d436ad2c595f94cd865e35339939cf5637d11695202fbd5e127b4aa527d0f4bdefa31b0b983631eb09f39f342d3ca80693c8bfaeb897b8f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un012154.exe

    Filesize

    598KB

    MD5

    afeb3b1b00dc6993d135e312f3166e51

    SHA1

    988637ba75f00e1ad91210f4e80acb70c4a46aec

    SHA256

    b9b27015c35d8d65721d338a5e52ffdef0ae18277d04a395ae2564f7ccb7f60c

    SHA512

    acc503aa5e8331db9d86811c72fbbb9326a28610627a0c75ae4daba6cd02e3f6d14b15fdc2e078ca43de350d5a49b5f6a83110c52ee82e4cac597757b4b1215c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un012154.exe

    Filesize

    598KB

    MD5

    afeb3b1b00dc6993d135e312f3166e51

    SHA1

    988637ba75f00e1ad91210f4e80acb70c4a46aec

    SHA256

    b9b27015c35d8d65721d338a5e52ffdef0ae18277d04a395ae2564f7ccb7f60c

    SHA512

    acc503aa5e8331db9d86811c72fbbb9326a28610627a0c75ae4daba6cd02e3f6d14b15fdc2e078ca43de350d5a49b5f6a83110c52ee82e4cac597757b4b1215c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe

    Filesize

    390KB

    MD5

    acd26f7d98a58d8833a99ddc8c035d7b

    SHA1

    958c8de1d125548b0bdcccde4a62fa30767e33af

    SHA256

    49ceac6965494d52c5a9bf8ccf9d5ddf8b882321aeee6a9722613583bd1db313

    SHA512

    f43c6ace4cd872feba2fd1c1bd21faadd9b6bef4360e22af2379af7aa293e5d7266f8c0563f0290c8a59eea1efa3b6ee6e0db2d81218ff640baa1d4141f862b4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe

    Filesize

    390KB

    MD5

    acd26f7d98a58d8833a99ddc8c035d7b

    SHA1

    958c8de1d125548b0bdcccde4a62fa30767e33af

    SHA256

    49ceac6965494d52c5a9bf8ccf9d5ddf8b882321aeee6a9722613583bd1db313

    SHA512

    f43c6ace4cd872feba2fd1c1bd21faadd9b6bef4360e22af2379af7aa293e5d7266f8c0563f0290c8a59eea1efa3b6ee6e0db2d81218ff640baa1d4141f862b4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe

    Filesize

    390KB

    MD5

    acd26f7d98a58d8833a99ddc8c035d7b

    SHA1

    958c8de1d125548b0bdcccde4a62fa30767e33af

    SHA256

    49ceac6965494d52c5a9bf8ccf9d5ddf8b882321aeee6a9722613583bd1db313

    SHA512

    f43c6ace4cd872feba2fd1c1bd21faadd9b6bef4360e22af2379af7aa293e5d7266f8c0563f0290c8a59eea1efa3b6ee6e0db2d81218ff640baa1d4141f862b4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe

    Filesize

    473KB

    MD5

    2d2b724b11505d2df5d0ee9499a847e5

    SHA1

    7b2d9e070ab7f39d268c4c0b6eb7418c96ea8b8a

    SHA256

    d6e70034b1f18f4290aa7430539689ad42dcc2912426fb5da7c198218ea97899

    SHA512

    5c7ee47fcf75bd5f8d436ad2c595f94cd865e35339939cf5637d11695202fbd5e127b4aa527d0f4bdefa31b0b983631eb09f39f342d3ca80693c8bfaeb897b8f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe

    Filesize

    473KB

    MD5

    2d2b724b11505d2df5d0ee9499a847e5

    SHA1

    7b2d9e070ab7f39d268c4c0b6eb7418c96ea8b8a

    SHA256

    d6e70034b1f18f4290aa7430539689ad42dcc2912426fb5da7c198218ea97899

    SHA512

    5c7ee47fcf75bd5f8d436ad2c595f94cd865e35339939cf5637d11695202fbd5e127b4aa527d0f4bdefa31b0b983631eb09f39f342d3ca80693c8bfaeb897b8f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe

    Filesize

    473KB

    MD5

    2d2b724b11505d2df5d0ee9499a847e5

    SHA1

    7b2d9e070ab7f39d268c4c0b6eb7418c96ea8b8a

    SHA256

    d6e70034b1f18f4290aa7430539689ad42dcc2912426fb5da7c198218ea97899

    SHA512

    5c7ee47fcf75bd5f8d436ad2c595f94cd865e35339939cf5637d11695202fbd5e127b4aa527d0f4bdefa31b0b983631eb09f39f342d3ca80693c8bfaeb897b8f

  • memory/652-116-0x0000000004E80000-0x0000000004EC0000-memory.dmp

    Filesize

    256KB

  • memory/652-87-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-85-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-91-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-89-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-95-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-93-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-99-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-97-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-103-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-101-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-107-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-105-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-109-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-110-0x0000000004E80000-0x0000000004EC0000-memory.dmp

    Filesize

    256KB

  • memory/652-111-0x0000000004E80000-0x0000000004EC0000-memory.dmp

    Filesize

    256KB

  • memory/652-112-0x0000000004E80000-0x0000000004EC0000-memory.dmp

    Filesize

    256KB

  • memory/652-115-0x0000000004E80000-0x0000000004EC0000-memory.dmp

    Filesize

    256KB

  • memory/652-83-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-117-0x0000000004E80000-0x0000000004EC0000-memory.dmp

    Filesize

    256KB

  • memory/652-82-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/652-81-0x00000000022D0000-0x00000000022E8000-memory.dmp

    Filesize

    96KB

  • memory/652-80-0x0000000000D40000-0x0000000000D5A000-memory.dmp

    Filesize

    104KB

  • memory/652-79-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/652-78-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/652-118-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/1308-130-0x0000000002750000-0x000000000278A000-memory.dmp

    Filesize

    232KB

  • memory/1308-149-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-131-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-132-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-134-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-136-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-138-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-140-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-142-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-143-0x0000000000360000-0x00000000003A6000-memory.dmp

    Filesize

    280KB

  • memory/1308-146-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-145-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/1308-147-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/1308-129-0x0000000002710000-0x000000000274C000-memory.dmp

    Filesize

    240KB

  • memory/1308-151-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-153-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-155-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-157-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-159-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-161-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-163-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-165-0x0000000002750000-0x0000000002785000-memory.dmp

    Filesize

    212KB

  • memory/1308-927-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/1308-928-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/1308-929-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/1308-930-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/1308-933-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB