Analysis

  • max time kernel
    214s
  • max time network
    291s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 19:14

General

  • Target

    bad970a5bf84591bff5372c741cb5feefe0da9d6f593963ac87e6ca062cd42e3.exe

  • Size

    694KB

  • MD5

    82d4e596aeb90063fe45024690da3016

  • SHA1

    06001ca0047925ff3936b0156c0ffe9555ce17f1

  • SHA256

    bad970a5bf84591bff5372c741cb5feefe0da9d6f593963ac87e6ca062cd42e3

  • SHA512

    78a512b43ab4e47778023767eb4bc098283b83b3e1d542d2a758064b1055925ba1c9ed4381c68617f6e12247e2a25496fcb942320f34ccde6f27b98261223fde

  • SSDEEP

    12288:ey90Yhw6TP/IZ33DlblZV/VOIAwpFT6ETU4U/uvxWb6Fn18b2KQA+LNDLBCE:eyVCo4ZnDtVdOIAoF7TJu6Fn18b2LvcE

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bad970a5bf84591bff5372c741cb5feefe0da9d6f593963ac87e6ca062cd42e3.exe
    "C:\Users\Admin\AppData\Local\Temp\bad970a5bf84591bff5372c741cb5feefe0da9d6f593963ac87e6ca062cd42e3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958203.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958203.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01297549.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01297549.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk696020.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk696020.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958203.exe

    Filesize

    540KB

    MD5

    11fdda31ff49e411ea64be8553fcd892

    SHA1

    f4c5dec4fd247eda13725410efd43a1df0d5237b

    SHA256

    08af21716858e92c3775bfc368569bde3f996cb6fb5544314e68f1a947063f75

    SHA512

    0a97aa3ccd1b31964ad95267a9128f3c949d30e5a7d4690bc88c5a46ec66fb41dbdb367927d7050565428abe15c6eb36962fcabb4a0dde84c96c05a2c702183a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958203.exe

    Filesize

    540KB

    MD5

    11fdda31ff49e411ea64be8553fcd892

    SHA1

    f4c5dec4fd247eda13725410efd43a1df0d5237b

    SHA256

    08af21716858e92c3775bfc368569bde3f996cb6fb5544314e68f1a947063f75

    SHA512

    0a97aa3ccd1b31964ad95267a9128f3c949d30e5a7d4690bc88c5a46ec66fb41dbdb367927d7050565428abe15c6eb36962fcabb4a0dde84c96c05a2c702183a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01297549.exe

    Filesize

    258KB

    MD5

    7c18c5ea3d01ba3f69f25cb118a93d46

    SHA1

    d15321882c82bea966e6ba370d611f81c9f4fcea

    SHA256

    5b311eefd8120f48210231bd346197109dd80cf17210bbb083ba0087a9203da0

    SHA512

    7719bfc858c4cacd6e442d983a28bf5477cd1bbbbac22b9dbbb6de7d16fce98a47dc3afdeac456311af4af780ddc17e10dc6c1cd9128a6ac80a628190ce2d4d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01297549.exe

    Filesize

    258KB

    MD5

    7c18c5ea3d01ba3f69f25cb118a93d46

    SHA1

    d15321882c82bea966e6ba370d611f81c9f4fcea

    SHA256

    5b311eefd8120f48210231bd346197109dd80cf17210bbb083ba0087a9203da0

    SHA512

    7719bfc858c4cacd6e442d983a28bf5477cd1bbbbac22b9dbbb6de7d16fce98a47dc3afdeac456311af4af780ddc17e10dc6c1cd9128a6ac80a628190ce2d4d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01297549.exe

    Filesize

    258KB

    MD5

    7c18c5ea3d01ba3f69f25cb118a93d46

    SHA1

    d15321882c82bea966e6ba370d611f81c9f4fcea

    SHA256

    5b311eefd8120f48210231bd346197109dd80cf17210bbb083ba0087a9203da0

    SHA512

    7719bfc858c4cacd6e442d983a28bf5477cd1bbbbac22b9dbbb6de7d16fce98a47dc3afdeac456311af4af780ddc17e10dc6c1cd9128a6ac80a628190ce2d4d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk696020.exe

    Filesize

    340KB

    MD5

    cf4fbbd5a2c9d18eb213c9235fca5488

    SHA1

    3b6c02caf775dcedf1b9cdf2586d5bf6871b5f6b

    SHA256

    1d15597e7aa6e4e46abc33b2f9e689b8a812d0365e28faaa653c2fbb84c2d5b4

    SHA512

    fa626bd7cabec3c486288b01da738d6c30fc40d6aa200498fa09f3e1e8fceb45edfb8465bb036c336614641fdcc3e59806a01c89003fde29e2549dd7fce8fff5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk696020.exe

    Filesize

    340KB

    MD5

    cf4fbbd5a2c9d18eb213c9235fca5488

    SHA1

    3b6c02caf775dcedf1b9cdf2586d5bf6871b5f6b

    SHA256

    1d15597e7aa6e4e46abc33b2f9e689b8a812d0365e28faaa653c2fbb84c2d5b4

    SHA512

    fa626bd7cabec3c486288b01da738d6c30fc40d6aa200498fa09f3e1e8fceb45edfb8465bb036c336614641fdcc3e59806a01c89003fde29e2549dd7fce8fff5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk696020.exe

    Filesize

    340KB

    MD5

    cf4fbbd5a2c9d18eb213c9235fca5488

    SHA1

    3b6c02caf775dcedf1b9cdf2586d5bf6871b5f6b

    SHA256

    1d15597e7aa6e4e46abc33b2f9e689b8a812d0365e28faaa653c2fbb84c2d5b4

    SHA512

    fa626bd7cabec3c486288b01da738d6c30fc40d6aa200498fa09f3e1e8fceb45edfb8465bb036c336614641fdcc3e59806a01c89003fde29e2549dd7fce8fff5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un958203.exe

    Filesize

    540KB

    MD5

    11fdda31ff49e411ea64be8553fcd892

    SHA1

    f4c5dec4fd247eda13725410efd43a1df0d5237b

    SHA256

    08af21716858e92c3775bfc368569bde3f996cb6fb5544314e68f1a947063f75

    SHA512

    0a97aa3ccd1b31964ad95267a9128f3c949d30e5a7d4690bc88c5a46ec66fb41dbdb367927d7050565428abe15c6eb36962fcabb4a0dde84c96c05a2c702183a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un958203.exe

    Filesize

    540KB

    MD5

    11fdda31ff49e411ea64be8553fcd892

    SHA1

    f4c5dec4fd247eda13725410efd43a1df0d5237b

    SHA256

    08af21716858e92c3775bfc368569bde3f996cb6fb5544314e68f1a947063f75

    SHA512

    0a97aa3ccd1b31964ad95267a9128f3c949d30e5a7d4690bc88c5a46ec66fb41dbdb367927d7050565428abe15c6eb36962fcabb4a0dde84c96c05a2c702183a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\01297549.exe

    Filesize

    258KB

    MD5

    7c18c5ea3d01ba3f69f25cb118a93d46

    SHA1

    d15321882c82bea966e6ba370d611f81c9f4fcea

    SHA256

    5b311eefd8120f48210231bd346197109dd80cf17210bbb083ba0087a9203da0

    SHA512

    7719bfc858c4cacd6e442d983a28bf5477cd1bbbbac22b9dbbb6de7d16fce98a47dc3afdeac456311af4af780ddc17e10dc6c1cd9128a6ac80a628190ce2d4d0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\01297549.exe

    Filesize

    258KB

    MD5

    7c18c5ea3d01ba3f69f25cb118a93d46

    SHA1

    d15321882c82bea966e6ba370d611f81c9f4fcea

    SHA256

    5b311eefd8120f48210231bd346197109dd80cf17210bbb083ba0087a9203da0

    SHA512

    7719bfc858c4cacd6e442d983a28bf5477cd1bbbbac22b9dbbb6de7d16fce98a47dc3afdeac456311af4af780ddc17e10dc6c1cd9128a6ac80a628190ce2d4d0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\01297549.exe

    Filesize

    258KB

    MD5

    7c18c5ea3d01ba3f69f25cb118a93d46

    SHA1

    d15321882c82bea966e6ba370d611f81c9f4fcea

    SHA256

    5b311eefd8120f48210231bd346197109dd80cf17210bbb083ba0087a9203da0

    SHA512

    7719bfc858c4cacd6e442d983a28bf5477cd1bbbbac22b9dbbb6de7d16fce98a47dc3afdeac456311af4af780ddc17e10dc6c1cd9128a6ac80a628190ce2d4d0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk696020.exe

    Filesize

    340KB

    MD5

    cf4fbbd5a2c9d18eb213c9235fca5488

    SHA1

    3b6c02caf775dcedf1b9cdf2586d5bf6871b5f6b

    SHA256

    1d15597e7aa6e4e46abc33b2f9e689b8a812d0365e28faaa653c2fbb84c2d5b4

    SHA512

    fa626bd7cabec3c486288b01da738d6c30fc40d6aa200498fa09f3e1e8fceb45edfb8465bb036c336614641fdcc3e59806a01c89003fde29e2549dd7fce8fff5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk696020.exe

    Filesize

    340KB

    MD5

    cf4fbbd5a2c9d18eb213c9235fca5488

    SHA1

    3b6c02caf775dcedf1b9cdf2586d5bf6871b5f6b

    SHA256

    1d15597e7aa6e4e46abc33b2f9e689b8a812d0365e28faaa653c2fbb84c2d5b4

    SHA512

    fa626bd7cabec3c486288b01da738d6c30fc40d6aa200498fa09f3e1e8fceb45edfb8465bb036c336614641fdcc3e59806a01c89003fde29e2549dd7fce8fff5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk696020.exe

    Filesize

    340KB

    MD5

    cf4fbbd5a2c9d18eb213c9235fca5488

    SHA1

    3b6c02caf775dcedf1b9cdf2586d5bf6871b5f6b

    SHA256

    1d15597e7aa6e4e46abc33b2f9e689b8a812d0365e28faaa653c2fbb84c2d5b4

    SHA512

    fa626bd7cabec3c486288b01da738d6c30fc40d6aa200498fa09f3e1e8fceb45edfb8465bb036c336614641fdcc3e59806a01c89003fde29e2549dd7fce8fff5

  • memory/588-115-0x00000000071F0000-0x0000000007230000-memory.dmp

    Filesize

    256KB

  • memory/588-87-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-89-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-91-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-93-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-95-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-97-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-99-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-101-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-103-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-105-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-107-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-109-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-111-0x00000000071F0000-0x0000000007230000-memory.dmp

    Filesize

    256KB

  • memory/588-112-0x00000000071F0000-0x0000000007230000-memory.dmp

    Filesize

    256KB

  • memory/588-113-0x00000000071F0000-0x0000000007230000-memory.dmp

    Filesize

    256KB

  • memory/588-85-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-117-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/588-83-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-82-0x00000000032C0000-0x00000000032D3000-memory.dmp

    Filesize

    76KB

  • memory/588-81-0x00000000032C0000-0x00000000032D8000-memory.dmp

    Filesize

    96KB

  • memory/588-80-0x0000000000390000-0x00000000003AA000-memory.dmp

    Filesize

    104KB

  • memory/588-79-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/588-78-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/1536-129-0x00000000071C0000-0x00000000071FA000-memory.dmp

    Filesize

    232KB

  • memory/1536-151-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-130-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-133-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-131-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-135-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-137-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-139-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-141-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-143-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-145-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-147-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-149-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-128-0x0000000007180000-0x00000000071BC000-memory.dmp

    Filesize

    240KB

  • memory/1536-153-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-155-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-157-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-159-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1536-865-0x0000000000260000-0x00000000002A6000-memory.dmp

    Filesize

    280KB

  • memory/1536-867-0x0000000006F40000-0x0000000006F80000-memory.dmp

    Filesize

    256KB

  • memory/1536-869-0x0000000006F40000-0x0000000006F80000-memory.dmp

    Filesize

    256KB

  • memory/1536-871-0x0000000006F40000-0x0000000006F80000-memory.dmp

    Filesize

    256KB

  • memory/1536-926-0x0000000006F40000-0x0000000006F80000-memory.dmp

    Filesize

    256KB

  • memory/1536-929-0x0000000006F40000-0x0000000006F80000-memory.dmp

    Filesize

    256KB

  • memory/1536-930-0x0000000006F40000-0x0000000006F80000-memory.dmp

    Filesize

    256KB

  • memory/1536-931-0x0000000006F40000-0x0000000006F80000-memory.dmp

    Filesize

    256KB