Analysis

  • max time kernel
    146s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 19:03

General

  • Target

    b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe

  • Size

    696KB

  • MD5

    46c5d415ae900547c67e46d2c5b10e99

  • SHA1

    4265c640004d22544e23733190a47f20c424af64

  • SHA256

    b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75

  • SHA512

    329fff8777f25c0cf604b80859f93afa1ba2deb422cb7d8f3df1a8ba3c6c6ec9fb7978f1f0d5dc85720d4e26e7e0e53a2f04901cbaac7363b140e6164ec2014d

  • SSDEEP

    12288:y/y90HghzsWWrh0ArHiRKksjQFxr8UFdMM9e6Z52PBb0c/:gyNhwWWrZ4KoFxYUFHougPBYc/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe
    "C:\Users\Admin\AppData\Local\Temp\b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un882836.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un882836.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un882836.exe

    Filesize

    542KB

    MD5

    acd518c7fc1539c9e2ab7d9222a0317a

    SHA1

    bd305922855413ce3a5bcf66976c1fed64f94b08

    SHA256

    dfdf3a0d0f49b07349ae9ac748d44682875a2bca57bc75b4efa47d0d0de6367f

    SHA512

    9e22d67a59912fea9b4a9e237653c3605fb39cd74a53e474607e0a559b87006b51c1511235e78f5e34dddcba618c1083259a57330388cc86160fb2df5e4b70f0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un882836.exe

    Filesize

    542KB

    MD5

    acd518c7fc1539c9e2ab7d9222a0317a

    SHA1

    bd305922855413ce3a5bcf66976c1fed64f94b08

    SHA256

    dfdf3a0d0f49b07349ae9ac748d44682875a2bca57bc75b4efa47d0d0de6367f

    SHA512

    9e22d67a59912fea9b4a9e237653c3605fb39cd74a53e474607e0a559b87006b51c1511235e78f5e34dddcba618c1083259a57330388cc86160fb2df5e4b70f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exe

    Filesize

    263KB

    MD5

    8aa0057da72dbc4de69388395d30f7bf

    SHA1

    50d2b3aee624feaab7b78831291e695416b88fc6

    SHA256

    aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049

    SHA512

    b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exe

    Filesize

    263KB

    MD5

    8aa0057da72dbc4de69388395d30f7bf

    SHA1

    50d2b3aee624feaab7b78831291e695416b88fc6

    SHA256

    aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049

    SHA512

    b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exe

    Filesize

    263KB

    MD5

    8aa0057da72dbc4de69388395d30f7bf

    SHA1

    50d2b3aee624feaab7b78831291e695416b88fc6

    SHA256

    aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049

    SHA512

    b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exe

    Filesize

    328KB

    MD5

    4badfb5e978c89ea1d82ee094ed1925c

    SHA1

    bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff

    SHA256

    8f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff

    SHA512

    67731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exe

    Filesize

    328KB

    MD5

    4badfb5e978c89ea1d82ee094ed1925c

    SHA1

    bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff

    SHA256

    8f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff

    SHA512

    67731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exe

    Filesize

    328KB

    MD5

    4badfb5e978c89ea1d82ee094ed1925c

    SHA1

    bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff

    SHA256

    8f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff

    SHA512

    67731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un882836.exe

    Filesize

    542KB

    MD5

    acd518c7fc1539c9e2ab7d9222a0317a

    SHA1

    bd305922855413ce3a5bcf66976c1fed64f94b08

    SHA256

    dfdf3a0d0f49b07349ae9ac748d44682875a2bca57bc75b4efa47d0d0de6367f

    SHA512

    9e22d67a59912fea9b4a9e237653c3605fb39cd74a53e474607e0a559b87006b51c1511235e78f5e34dddcba618c1083259a57330388cc86160fb2df5e4b70f0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un882836.exe

    Filesize

    542KB

    MD5

    acd518c7fc1539c9e2ab7d9222a0317a

    SHA1

    bd305922855413ce3a5bcf66976c1fed64f94b08

    SHA256

    dfdf3a0d0f49b07349ae9ac748d44682875a2bca57bc75b4efa47d0d0de6367f

    SHA512

    9e22d67a59912fea9b4a9e237653c3605fb39cd74a53e474607e0a559b87006b51c1511235e78f5e34dddcba618c1083259a57330388cc86160fb2df5e4b70f0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exe

    Filesize

    263KB

    MD5

    8aa0057da72dbc4de69388395d30f7bf

    SHA1

    50d2b3aee624feaab7b78831291e695416b88fc6

    SHA256

    aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049

    SHA512

    b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exe

    Filesize

    263KB

    MD5

    8aa0057da72dbc4de69388395d30f7bf

    SHA1

    50d2b3aee624feaab7b78831291e695416b88fc6

    SHA256

    aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049

    SHA512

    b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exe

    Filesize

    263KB

    MD5

    8aa0057da72dbc4de69388395d30f7bf

    SHA1

    50d2b3aee624feaab7b78831291e695416b88fc6

    SHA256

    aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049

    SHA512

    b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exe

    Filesize

    328KB

    MD5

    4badfb5e978c89ea1d82ee094ed1925c

    SHA1

    bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff

    SHA256

    8f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff

    SHA512

    67731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exe

    Filesize

    328KB

    MD5

    4badfb5e978c89ea1d82ee094ed1925c

    SHA1

    bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff

    SHA256

    8f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff

    SHA512

    67731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exe

    Filesize

    328KB

    MD5

    4badfb5e978c89ea1d82ee094ed1925c

    SHA1

    bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff

    SHA256

    8f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff

    SHA512

    67731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a

  • memory/1184-84-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-86-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-88-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-90-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-92-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-94-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-96-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-98-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-100-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-102-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-104-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-106-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-108-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-110-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-111-0x0000000000400000-0x0000000002B99000-memory.dmp

    Filesize

    39.6MB

  • memory/1184-112-0x0000000000400000-0x0000000002B99000-memory.dmp

    Filesize

    39.6MB

  • memory/1184-83-0x0000000004720000-0x0000000004733000-memory.dmp

    Filesize

    76KB

  • memory/1184-82-0x0000000004720000-0x0000000004738000-memory.dmp

    Filesize

    96KB

  • memory/1184-80-0x0000000007350000-0x0000000007390000-memory.dmp

    Filesize

    256KB

  • memory/1184-81-0x0000000007350000-0x0000000007390000-memory.dmp

    Filesize

    256KB

  • memory/1184-79-0x0000000002CD0000-0x0000000002CEA000-memory.dmp

    Filesize

    104KB

  • memory/1184-78-0x0000000000290000-0x00000000002BD000-memory.dmp

    Filesize

    180KB

  • memory/1384-130-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-150-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-125-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-123-0x00000000032E0000-0x000000000331C000-memory.dmp

    Filesize

    240KB

  • memory/1384-128-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-126-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-132-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-136-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-140-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-142-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-138-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-134-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-146-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-148-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-144-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-124-0x0000000003330000-0x000000000336A000-memory.dmp

    Filesize

    232KB

  • memory/1384-152-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-154-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-156-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-158-0x0000000003330000-0x0000000003365000-memory.dmp

    Filesize

    212KB

  • memory/1384-299-0x0000000000290000-0x00000000002D6000-memory.dmp

    Filesize

    280KB

  • memory/1384-301-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1384-303-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1384-304-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1384-921-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1384-924-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1384-925-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1384-926-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1384-927-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB