Analysis

  • max time kernel
    144s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 19:00

General

  • Target

    101b57871792d53eac167c7fab7503a5ef8c815283dbcc6682f587a10eea4074.exe

  • Size

    559KB

  • MD5

    af25111a225e484c58996c24c550d897

  • SHA1

    a0ec04d55b799baea255720efc9e320911f04109

  • SHA256

    101b57871792d53eac167c7fab7503a5ef8c815283dbcc6682f587a10eea4074

  • SHA512

    fede48ef8dcd580007df444200fe1fb8da5a17b1776b31c282cc900cb6c7d76a80c04a499ad1bc30d6cf0fe2dd60a5280e693ed6a921382062f8cd12d364b914

  • SSDEEP

    12288:ey901NJEMoHcAh9jPFHotQjtmLo9SQsH09YGRDTMifJhUKhdq1f3F:eyeJETrVdtUQpYQDTnfJh7z43F

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\101b57871792d53eac167c7fab7503a5ef8c815283dbcc6682f587a10eea4074.exe
    "C:\Users\Admin\AppData\Local\Temp\101b57871792d53eac167c7fab7503a5ef8c815283dbcc6682f587a10eea4074.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr9255.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr9255.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it704974.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it704974.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr9255.exe

    Filesize

    405KB

    MD5

    01e78fe8ed422344c9c508971a22ea57

    SHA1

    38cf51565b9389e5bb6da5a5ecddcaa99ce50aff

    SHA256

    647e33426c57dadd449c1b771f8f2d41f60db2e5111149711c18beca87af83ff

    SHA512

    443e2faeb0e0715d8047badfd09d7c48509282afdd50a44363d1b0074b27a5d041c22c41914e71e7e7ccdc82a528514e1ed5a9b77cc618c1bc4957ada858f318

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr9255.exe

    Filesize

    405KB

    MD5

    01e78fe8ed422344c9c508971a22ea57

    SHA1

    38cf51565b9389e5bb6da5a5ecddcaa99ce50aff

    SHA256

    647e33426c57dadd449c1b771f8f2d41f60db2e5111149711c18beca87af83ff

    SHA512

    443e2faeb0e0715d8047badfd09d7c48509282afdd50a44363d1b0074b27a5d041c22c41914e71e7e7ccdc82a528514e1ed5a9b77cc618c1bc4957ada858f318

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it704974.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it704974.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe

    Filesize

    351KB

    MD5

    c00dc58a2b7e066643ca181208a75c2f

    SHA1

    bc85d8340e66d4b954c2667c2f188de0deb29190

    SHA256

    5e691f28660121cb515e1c57e2cb7727250e0110c986d299a4df204a5eee0e5c

    SHA512

    d931619a6e1877c5187ebe46af561003efbaede5be27675f253ca5880e4f67e720119bdc7d68dd543a51011387d48e43df78194834236426163e99719b87099d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe

    Filesize

    351KB

    MD5

    c00dc58a2b7e066643ca181208a75c2f

    SHA1

    bc85d8340e66d4b954c2667c2f188de0deb29190

    SHA256

    5e691f28660121cb515e1c57e2cb7727250e0110c986d299a4df204a5eee0e5c

    SHA512

    d931619a6e1877c5187ebe46af561003efbaede5be27675f253ca5880e4f67e720119bdc7d68dd543a51011387d48e43df78194834236426163e99719b87099d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe

    Filesize

    351KB

    MD5

    c00dc58a2b7e066643ca181208a75c2f

    SHA1

    bc85d8340e66d4b954c2667c2f188de0deb29190

    SHA256

    5e691f28660121cb515e1c57e2cb7727250e0110c986d299a4df204a5eee0e5c

    SHA512

    d931619a6e1877c5187ebe46af561003efbaede5be27675f253ca5880e4f67e720119bdc7d68dd543a51011387d48e43df78194834236426163e99719b87099d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr9255.exe

    Filesize

    405KB

    MD5

    01e78fe8ed422344c9c508971a22ea57

    SHA1

    38cf51565b9389e5bb6da5a5ecddcaa99ce50aff

    SHA256

    647e33426c57dadd449c1b771f8f2d41f60db2e5111149711c18beca87af83ff

    SHA512

    443e2faeb0e0715d8047badfd09d7c48509282afdd50a44363d1b0074b27a5d041c22c41914e71e7e7ccdc82a528514e1ed5a9b77cc618c1bc4957ada858f318

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr9255.exe

    Filesize

    405KB

    MD5

    01e78fe8ed422344c9c508971a22ea57

    SHA1

    38cf51565b9389e5bb6da5a5ecddcaa99ce50aff

    SHA256

    647e33426c57dadd449c1b771f8f2d41f60db2e5111149711c18beca87af83ff

    SHA512

    443e2faeb0e0715d8047badfd09d7c48509282afdd50a44363d1b0074b27a5d041c22c41914e71e7e7ccdc82a528514e1ed5a9b77cc618c1bc4957ada858f318

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\it704974.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe

    Filesize

    351KB

    MD5

    c00dc58a2b7e066643ca181208a75c2f

    SHA1

    bc85d8340e66d4b954c2667c2f188de0deb29190

    SHA256

    5e691f28660121cb515e1c57e2cb7727250e0110c986d299a4df204a5eee0e5c

    SHA512

    d931619a6e1877c5187ebe46af561003efbaede5be27675f253ca5880e4f67e720119bdc7d68dd543a51011387d48e43df78194834236426163e99719b87099d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe

    Filesize

    351KB

    MD5

    c00dc58a2b7e066643ca181208a75c2f

    SHA1

    bc85d8340e66d4b954c2667c2f188de0deb29190

    SHA256

    5e691f28660121cb515e1c57e2cb7727250e0110c986d299a4df204a5eee0e5c

    SHA512

    d931619a6e1877c5187ebe46af561003efbaede5be27675f253ca5880e4f67e720119bdc7d68dd543a51011387d48e43df78194834236426163e99719b87099d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp245179.exe

    Filesize

    351KB

    MD5

    c00dc58a2b7e066643ca181208a75c2f

    SHA1

    bc85d8340e66d4b954c2667c2f188de0deb29190

    SHA256

    5e691f28660121cb515e1c57e2cb7727250e0110c986d299a4df204a5eee0e5c

    SHA512

    d931619a6e1877c5187ebe46af561003efbaede5be27675f253ca5880e4f67e720119bdc7d68dd543a51011387d48e43df78194834236426163e99719b87099d

  • memory/432-72-0x00000000010F0000-0x00000000010FA000-memory.dmp

    Filesize

    40KB

  • memory/996-101-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-119-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-85-0x00000000072B0000-0x00000000072F0000-memory.dmp

    Filesize

    256KB

  • memory/996-86-0x00000000072B0000-0x00000000072F0000-memory.dmp

    Filesize

    256KB

  • memory/996-87-0x0000000004890000-0x00000000048CA000-memory.dmp

    Filesize

    232KB

  • memory/996-88-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-89-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-91-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-93-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-95-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-97-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-99-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-83-0x00000000003A0000-0x00000000003E6000-memory.dmp

    Filesize

    280KB

  • memory/996-103-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-105-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-107-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-109-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-111-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-113-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-115-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-117-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-84-0x0000000004850000-0x000000000488C000-memory.dmp

    Filesize

    240KB

  • memory/996-121-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-123-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-125-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-127-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-129-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-131-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-133-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-135-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-137-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-139-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-141-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-143-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-145-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-147-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-149-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-151-0x0000000004890000-0x00000000048C5000-memory.dmp

    Filesize

    212KB

  • memory/996-880-0x00000000072B0000-0x00000000072F0000-memory.dmp

    Filesize

    256KB

  • memory/996-882-0x00000000072B0000-0x00000000072F0000-memory.dmp

    Filesize

    256KB

  • memory/996-884-0x00000000072B0000-0x00000000072F0000-memory.dmp

    Filesize

    256KB