Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 19:07

General

  • Target

    b4eb6c5205f61088248ff6c7c0e93704567ef09116b0a9041206b4103e2c612c.exe

  • Size

    746KB

  • MD5

    878507b7ab5bc35ed3146b7eebb9908e

  • SHA1

    a64c76f90686d929befb336bf8586e6c1c359c35

  • SHA256

    b4eb6c5205f61088248ff6c7c0e93704567ef09116b0a9041206b4103e2c612c

  • SHA512

    d8b0a7c2cce1c1f39671c3012bb76bde50b6860d75d7bca59fdbcfb042b9bf29bb830cca65bddab789cb2e6fd2da63ca1a0c4a3135416df2e95b4df467407db7

  • SSDEEP

    12288:wy902vGIocOpE8oqvSrVR+KdB5C+bX6ZVB+5RZvI9YbNx9LmHk9D5WHfgiyH3J9b:wyocO1BvVKdvC+eZe5RoivxEcAfgnZtz

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4eb6c5205f61088248ff6c7c0e93704567ef09116b0a9041206b4103e2c612c.exe
    "C:\Users\Admin\AppData\Local\Temp\b4eb6c5205f61088248ff6c7c0e93704567ef09116b0a9041206b4103e2c612c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un913468.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un913468.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16947756.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16947756.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk439768.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk439768.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un913468.exe

    Filesize

    592KB

    MD5

    15d21502a7ceb5814578c2708289edd5

    SHA1

    26a08975d8beb010300a21fa841dc5a467e7f69d

    SHA256

    7a4c14615ff90de7b0e6e182fd744c5864ab77044830c22014b155f53ff36269

    SHA512

    bae31d0744eec9a2d974a966829cbba98f5c5a1f3ee6484748e6971800213da401359af411fbc4add2ec78ccdea337f763b5a7ec29f86ef32090b36bdb547265

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un913468.exe

    Filesize

    592KB

    MD5

    15d21502a7ceb5814578c2708289edd5

    SHA1

    26a08975d8beb010300a21fa841dc5a467e7f69d

    SHA256

    7a4c14615ff90de7b0e6e182fd744c5864ab77044830c22014b155f53ff36269

    SHA512

    bae31d0744eec9a2d974a966829cbba98f5c5a1f3ee6484748e6971800213da401359af411fbc4add2ec78ccdea337f763b5a7ec29f86ef32090b36bdb547265

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16947756.exe

    Filesize

    378KB

    MD5

    5f4dce052e8a0d14281126f2fabbd6f5

    SHA1

    6d8f029168e1a7de1a4bbbcd9e0fa75cd7d9d935

    SHA256

    2bfd3cd181cc8cc84c911c1b572e3c224e88575f5ca87ed34c6531609780a626

    SHA512

    6c2fbfea4b0f191017c992134d037e163c705b3ebb4a1891395e18b699f4a03216bc9de7f87877e81acfdeb35976e88073d6357ced2b057cf00ff8a441177245

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16947756.exe

    Filesize

    378KB

    MD5

    5f4dce052e8a0d14281126f2fabbd6f5

    SHA1

    6d8f029168e1a7de1a4bbbcd9e0fa75cd7d9d935

    SHA256

    2bfd3cd181cc8cc84c911c1b572e3c224e88575f5ca87ed34c6531609780a626

    SHA512

    6c2fbfea4b0f191017c992134d037e163c705b3ebb4a1891395e18b699f4a03216bc9de7f87877e81acfdeb35976e88073d6357ced2b057cf00ff8a441177245

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16947756.exe

    Filesize

    378KB

    MD5

    5f4dce052e8a0d14281126f2fabbd6f5

    SHA1

    6d8f029168e1a7de1a4bbbcd9e0fa75cd7d9d935

    SHA256

    2bfd3cd181cc8cc84c911c1b572e3c224e88575f5ca87ed34c6531609780a626

    SHA512

    6c2fbfea4b0f191017c992134d037e163c705b3ebb4a1891395e18b699f4a03216bc9de7f87877e81acfdeb35976e88073d6357ced2b057cf00ff8a441177245

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk439768.exe

    Filesize

    460KB

    MD5

    54d1be7a49e7d38bf895e549af18baea

    SHA1

    ef7d63002b4891970ee9cfccd56b873ca46da63e

    SHA256

    83c1e0e8d24ac049536641448207c5f64d235f853d8721edac45b6b39e6ab5e2

    SHA512

    84302606cdcdd04a6e9c9688dbf56a279dc409d1e3ba46017d3671d9be937abbea1953b634fe56b29a760fc13e9a5c97dd6f3d641ec58fd672235f5d5fd1e1d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk439768.exe

    Filesize

    460KB

    MD5

    54d1be7a49e7d38bf895e549af18baea

    SHA1

    ef7d63002b4891970ee9cfccd56b873ca46da63e

    SHA256

    83c1e0e8d24ac049536641448207c5f64d235f853d8721edac45b6b39e6ab5e2

    SHA512

    84302606cdcdd04a6e9c9688dbf56a279dc409d1e3ba46017d3671d9be937abbea1953b634fe56b29a760fc13e9a5c97dd6f3d641ec58fd672235f5d5fd1e1d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk439768.exe

    Filesize

    460KB

    MD5

    54d1be7a49e7d38bf895e549af18baea

    SHA1

    ef7d63002b4891970ee9cfccd56b873ca46da63e

    SHA256

    83c1e0e8d24ac049536641448207c5f64d235f853d8721edac45b6b39e6ab5e2

    SHA512

    84302606cdcdd04a6e9c9688dbf56a279dc409d1e3ba46017d3671d9be937abbea1953b634fe56b29a760fc13e9a5c97dd6f3d641ec58fd672235f5d5fd1e1d4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un913468.exe

    Filesize

    592KB

    MD5

    15d21502a7ceb5814578c2708289edd5

    SHA1

    26a08975d8beb010300a21fa841dc5a467e7f69d

    SHA256

    7a4c14615ff90de7b0e6e182fd744c5864ab77044830c22014b155f53ff36269

    SHA512

    bae31d0744eec9a2d974a966829cbba98f5c5a1f3ee6484748e6971800213da401359af411fbc4add2ec78ccdea337f763b5a7ec29f86ef32090b36bdb547265

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un913468.exe

    Filesize

    592KB

    MD5

    15d21502a7ceb5814578c2708289edd5

    SHA1

    26a08975d8beb010300a21fa841dc5a467e7f69d

    SHA256

    7a4c14615ff90de7b0e6e182fd744c5864ab77044830c22014b155f53ff36269

    SHA512

    bae31d0744eec9a2d974a966829cbba98f5c5a1f3ee6484748e6971800213da401359af411fbc4add2ec78ccdea337f763b5a7ec29f86ef32090b36bdb547265

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\16947756.exe

    Filesize

    378KB

    MD5

    5f4dce052e8a0d14281126f2fabbd6f5

    SHA1

    6d8f029168e1a7de1a4bbbcd9e0fa75cd7d9d935

    SHA256

    2bfd3cd181cc8cc84c911c1b572e3c224e88575f5ca87ed34c6531609780a626

    SHA512

    6c2fbfea4b0f191017c992134d037e163c705b3ebb4a1891395e18b699f4a03216bc9de7f87877e81acfdeb35976e88073d6357ced2b057cf00ff8a441177245

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\16947756.exe

    Filesize

    378KB

    MD5

    5f4dce052e8a0d14281126f2fabbd6f5

    SHA1

    6d8f029168e1a7de1a4bbbcd9e0fa75cd7d9d935

    SHA256

    2bfd3cd181cc8cc84c911c1b572e3c224e88575f5ca87ed34c6531609780a626

    SHA512

    6c2fbfea4b0f191017c992134d037e163c705b3ebb4a1891395e18b699f4a03216bc9de7f87877e81acfdeb35976e88073d6357ced2b057cf00ff8a441177245

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\16947756.exe

    Filesize

    378KB

    MD5

    5f4dce052e8a0d14281126f2fabbd6f5

    SHA1

    6d8f029168e1a7de1a4bbbcd9e0fa75cd7d9d935

    SHA256

    2bfd3cd181cc8cc84c911c1b572e3c224e88575f5ca87ed34c6531609780a626

    SHA512

    6c2fbfea4b0f191017c992134d037e163c705b3ebb4a1891395e18b699f4a03216bc9de7f87877e81acfdeb35976e88073d6357ced2b057cf00ff8a441177245

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk439768.exe

    Filesize

    460KB

    MD5

    54d1be7a49e7d38bf895e549af18baea

    SHA1

    ef7d63002b4891970ee9cfccd56b873ca46da63e

    SHA256

    83c1e0e8d24ac049536641448207c5f64d235f853d8721edac45b6b39e6ab5e2

    SHA512

    84302606cdcdd04a6e9c9688dbf56a279dc409d1e3ba46017d3671d9be937abbea1953b634fe56b29a760fc13e9a5c97dd6f3d641ec58fd672235f5d5fd1e1d4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk439768.exe

    Filesize

    460KB

    MD5

    54d1be7a49e7d38bf895e549af18baea

    SHA1

    ef7d63002b4891970ee9cfccd56b873ca46da63e

    SHA256

    83c1e0e8d24ac049536641448207c5f64d235f853d8721edac45b6b39e6ab5e2

    SHA512

    84302606cdcdd04a6e9c9688dbf56a279dc409d1e3ba46017d3671d9be937abbea1953b634fe56b29a760fc13e9a5c97dd6f3d641ec58fd672235f5d5fd1e1d4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk439768.exe

    Filesize

    460KB

    MD5

    54d1be7a49e7d38bf895e549af18baea

    SHA1

    ef7d63002b4891970ee9cfccd56b873ca46da63e

    SHA256

    83c1e0e8d24ac049536641448207c5f64d235f853d8721edac45b6b39e6ab5e2

    SHA512

    84302606cdcdd04a6e9c9688dbf56a279dc409d1e3ba46017d3671d9be937abbea1953b634fe56b29a760fc13e9a5c97dd6f3d641ec58fd672235f5d5fd1e1d4

  • memory/868-149-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-135-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-153-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-151-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-126-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-147-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-145-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-143-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-141-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-139-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-137-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-155-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-133-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-131-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-129-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-127-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-157-0x0000000002380000-0x00000000023B5000-memory.dmp

    Filesize

    212KB

  • memory/868-311-0x00000000002A0000-0x00000000002E6000-memory.dmp

    Filesize

    280KB

  • memory/868-313-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

    Filesize

    256KB

  • memory/868-920-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

    Filesize

    256KB

  • memory/868-922-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

    Filesize

    256KB

  • memory/868-924-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

    Filesize

    256KB

  • memory/868-124-0x0000000002330000-0x000000000236C000-memory.dmp

    Filesize

    240KB

  • memory/868-125-0x0000000002380000-0x00000000023BA000-memory.dmp

    Filesize

    232KB

  • memory/2016-83-0x0000000000400000-0x0000000000804000-memory.dmp

    Filesize

    4.0MB

  • memory/2016-113-0x0000000000400000-0x0000000000804000-memory.dmp

    Filesize

    4.0MB

  • memory/2016-109-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-111-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-105-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-107-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-101-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-103-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-97-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-99-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-93-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-95-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-91-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-89-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-87-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-85-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-84-0x0000000000940000-0x0000000000952000-memory.dmp

    Filesize

    72KB

  • memory/2016-82-0x0000000000940000-0x0000000000958000-memory.dmp

    Filesize

    96KB

  • memory/2016-81-0x0000000004EA0000-0x0000000004EE0000-memory.dmp

    Filesize

    256KB

  • memory/2016-80-0x00000000008E0000-0x00000000008FA000-memory.dmp

    Filesize

    104KB

  • memory/2016-79-0x0000000004EA0000-0x0000000004EE0000-memory.dmp

    Filesize

    256KB

  • memory/2016-78-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB