Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 19:04

General

  • Target

    b15a1b4bcaabe51127c5e900637ac9ec03d29cc1437983a6e055d3fe9dee3332.exe

  • Size

    611KB

  • MD5

    fa12ef8c21caa46e53679d6bb4a1d48b

  • SHA1

    45f97039a0de9b281efbb8317b9df238eaf58bd8

  • SHA256

    b15a1b4bcaabe51127c5e900637ac9ec03d29cc1437983a6e055d3fe9dee3332

  • SHA512

    84563bef7245f4f63d25b117ebc2137e62fd4243217ea26211e6ed969444b59823a67958f4c98db71d078942ee623410e821b8556a5d5e2cc0436d44ccf353de

  • SSDEEP

    12288:uy90dBjH3B4HFurWKsbMOcwUvXfSMNh3usxKkRW:uyeBjXKdfMyUvXfkkRW

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b15a1b4bcaabe51127c5e900637ac9ec03d29cc1437983a6e055d3fe9dee3332.exe
    "C:\Users\Admin\AppData\Local\Temp\b15a1b4bcaabe51127c5e900637ac9ec03d29cc1437983a6e055d3fe9dee3332.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st962525.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st962525.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\57144405.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\57144405.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp945579.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp945579.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1868

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st962525.exe

          Filesize

          456KB

          MD5

          ff03b559ada9336cb2c2e29dd4011b45

          SHA1

          e9e13d419e13f13e7d4facc2c761d9c3a4ef0c99

          SHA256

          e838a25ca9d3f666745b15125ecf1c01d68d140f8ba58232a255d83f58fa8717

          SHA512

          bc1c92b723c84b2ccd4a79a49561af9e3f7fd3fd8e4979f5e345b2bbf72bf068b135f7fdbaee04bf98de1a5fe3d7fcf6ea2a15187dbc8592e512b6074b8d4a9e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st962525.exe

          Filesize

          456KB

          MD5

          ff03b559ada9336cb2c2e29dd4011b45

          SHA1

          e9e13d419e13f13e7d4facc2c761d9c3a4ef0c99

          SHA256

          e838a25ca9d3f666745b15125ecf1c01d68d140f8ba58232a255d83f58fa8717

          SHA512

          bc1c92b723c84b2ccd4a79a49561af9e3f7fd3fd8e4979f5e345b2bbf72bf068b135f7fdbaee04bf98de1a5fe3d7fcf6ea2a15187dbc8592e512b6074b8d4a9e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\57144405.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\57144405.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp945579.exe

          Filesize

          459KB

          MD5

          346b7d637ed92c8e5c301ee27d82e3ea

          SHA1

          25686504186a108687edbbccec302c9dc7504efc

          SHA256

          a0c496450374dc57dce1019aef8b94a61a25240015ebb8b6deb0b67c48fc7a0d

          SHA512

          1cfb573fd562310aaa95629aa55b7862fd821ed77e630781ddc6257387345ddd52d994b9094399dcf9af1b07d7d97beee725808db9fedc143854c47fe2b34eda

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp945579.exe

          Filesize

          459KB

          MD5

          346b7d637ed92c8e5c301ee27d82e3ea

          SHA1

          25686504186a108687edbbccec302c9dc7504efc

          SHA256

          a0c496450374dc57dce1019aef8b94a61a25240015ebb8b6deb0b67c48fc7a0d

          SHA512

          1cfb573fd562310aaa95629aa55b7862fd821ed77e630781ddc6257387345ddd52d994b9094399dcf9af1b07d7d97beee725808db9fedc143854c47fe2b34eda

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp945579.exe

          Filesize

          459KB

          MD5

          346b7d637ed92c8e5c301ee27d82e3ea

          SHA1

          25686504186a108687edbbccec302c9dc7504efc

          SHA256

          a0c496450374dc57dce1019aef8b94a61a25240015ebb8b6deb0b67c48fc7a0d

          SHA512

          1cfb573fd562310aaa95629aa55b7862fd821ed77e630781ddc6257387345ddd52d994b9094399dcf9af1b07d7d97beee725808db9fedc143854c47fe2b34eda

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st962525.exe

          Filesize

          456KB

          MD5

          ff03b559ada9336cb2c2e29dd4011b45

          SHA1

          e9e13d419e13f13e7d4facc2c761d9c3a4ef0c99

          SHA256

          e838a25ca9d3f666745b15125ecf1c01d68d140f8ba58232a255d83f58fa8717

          SHA512

          bc1c92b723c84b2ccd4a79a49561af9e3f7fd3fd8e4979f5e345b2bbf72bf068b135f7fdbaee04bf98de1a5fe3d7fcf6ea2a15187dbc8592e512b6074b8d4a9e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st962525.exe

          Filesize

          456KB

          MD5

          ff03b559ada9336cb2c2e29dd4011b45

          SHA1

          e9e13d419e13f13e7d4facc2c761d9c3a4ef0c99

          SHA256

          e838a25ca9d3f666745b15125ecf1c01d68d140f8ba58232a255d83f58fa8717

          SHA512

          bc1c92b723c84b2ccd4a79a49561af9e3f7fd3fd8e4979f5e345b2bbf72bf068b135f7fdbaee04bf98de1a5fe3d7fcf6ea2a15187dbc8592e512b6074b8d4a9e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\57144405.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp945579.exe

          Filesize

          459KB

          MD5

          346b7d637ed92c8e5c301ee27d82e3ea

          SHA1

          25686504186a108687edbbccec302c9dc7504efc

          SHA256

          a0c496450374dc57dce1019aef8b94a61a25240015ebb8b6deb0b67c48fc7a0d

          SHA512

          1cfb573fd562310aaa95629aa55b7862fd821ed77e630781ddc6257387345ddd52d994b9094399dcf9af1b07d7d97beee725808db9fedc143854c47fe2b34eda

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp945579.exe

          Filesize

          459KB

          MD5

          346b7d637ed92c8e5c301ee27d82e3ea

          SHA1

          25686504186a108687edbbccec302c9dc7504efc

          SHA256

          a0c496450374dc57dce1019aef8b94a61a25240015ebb8b6deb0b67c48fc7a0d

          SHA512

          1cfb573fd562310aaa95629aa55b7862fd821ed77e630781ddc6257387345ddd52d994b9094399dcf9af1b07d7d97beee725808db9fedc143854c47fe2b34eda

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp945579.exe

          Filesize

          459KB

          MD5

          346b7d637ed92c8e5c301ee27d82e3ea

          SHA1

          25686504186a108687edbbccec302c9dc7504efc

          SHA256

          a0c496450374dc57dce1019aef8b94a61a25240015ebb8b6deb0b67c48fc7a0d

          SHA512

          1cfb573fd562310aaa95629aa55b7862fd821ed77e630781ddc6257387345ddd52d994b9094399dcf9af1b07d7d97beee725808db9fedc143854c47fe2b34eda

        • memory/848-72-0x0000000000DE0000-0x0000000000DEA000-memory.dmp

          Filesize

          40KB

        • memory/1868-104-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-118-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-85-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-86-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-88-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-90-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-92-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-94-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-96-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-98-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-100-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-102-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-83-0x00000000022B0000-0x00000000022EC000-memory.dmp

          Filesize

          240KB

        • memory/1868-106-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-110-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-108-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-112-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-114-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-116-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-84-0x00000000022F0000-0x000000000232A000-memory.dmp

          Filesize

          232KB

        • memory/1868-120-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-122-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-124-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-126-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-128-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-130-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-132-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-135-0x0000000005170000-0x00000000051B0000-memory.dmp

          Filesize

          256KB

        • memory/1868-136-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-133-0x00000000002A0000-0x00000000002E6000-memory.dmp

          Filesize

          280KB

        • memory/1868-138-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-140-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-142-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-144-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-146-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-148-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-150-0x00000000022F0000-0x0000000002325000-memory.dmp

          Filesize

          212KB

        • memory/1868-879-0x0000000005170000-0x00000000051B0000-memory.dmp

          Filesize

          256KB

        • memory/1868-882-0x0000000005170000-0x00000000051B0000-memory.dmp

          Filesize

          256KB