Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 20:14

General

  • Target

    e7a6c0f0547a43b8e6ce0d662b2b26da5ff350f69dede51fc540139f29286af7.exe

  • Size

    746KB

  • MD5

    a9ff689f1e7bb4a17e99c60c155e5492

  • SHA1

    2a11b18deb134e718f6beb697437550bbee62007

  • SHA256

    e7a6c0f0547a43b8e6ce0d662b2b26da5ff350f69dede51fc540139f29286af7

  • SHA512

    2342e7c43ef524ffa6aa26c84895796919e34ebd16ee3a2453fcdc4db3f767c5078bf251c422f9f2d01d1ae2cfb6301db90e7c274117e4a920bbedcc13498708

  • SSDEEP

    12288:Xy909xx2IsPJWj/+3d1QJxkaMyCI6enCqjBeXEp6FiQRNx8elr5zhttWC:Xywx2IK33d1QJx53hTnMXEp6FiqxfBfd

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7a6c0f0547a43b8e6ce0d662b2b26da5ff350f69dede51fc540139f29286af7.exe
    "C:\Users\Admin\AppData\Local\Temp\e7a6c0f0547a43b8e6ce0d662b2b26da5ff350f69dede51fc540139f29286af7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un819363.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un819363.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02665454.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02665454.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk591255.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk591255.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un819363.exe

    Filesize

    592KB

    MD5

    e5106c3b028a26679fac677edaca73e1

    SHA1

    5f1bf6775b57f1a0bc31026e44e89a0bda720c66

    SHA256

    7826f8d374112b426bedbf495d0d60d59173785a87ef3420d7e3712c7d2f62df

    SHA512

    687f2e2046b07509fbebea878152915176c1aa142c78346a22cbc65d8942151488ee763af6db3e7dfec0fb74fa08ef405512a12a490ed87a4fa482f0cb961cc3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un819363.exe

    Filesize

    592KB

    MD5

    e5106c3b028a26679fac677edaca73e1

    SHA1

    5f1bf6775b57f1a0bc31026e44e89a0bda720c66

    SHA256

    7826f8d374112b426bedbf495d0d60d59173785a87ef3420d7e3712c7d2f62df

    SHA512

    687f2e2046b07509fbebea878152915176c1aa142c78346a22cbc65d8942151488ee763af6db3e7dfec0fb74fa08ef405512a12a490ed87a4fa482f0cb961cc3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02665454.exe

    Filesize

    376KB

    MD5

    dc3ce220d105377f2e375105aaeb7419

    SHA1

    107f446f4528b614df9b602f0421e34c46880f9d

    SHA256

    3235d0cd1d10ba4e8f07441eab2e1f4e7fe6841687a052ff71f83acfb2fada70

    SHA512

    776b25ac20f85b8d1e5437712076818456f8bfff269af48090df4f592090b36676e2dce0e1d96837828f1860b443e51d7a9f4e0fac2dc52e15891735ce9eba48

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02665454.exe

    Filesize

    376KB

    MD5

    dc3ce220d105377f2e375105aaeb7419

    SHA1

    107f446f4528b614df9b602f0421e34c46880f9d

    SHA256

    3235d0cd1d10ba4e8f07441eab2e1f4e7fe6841687a052ff71f83acfb2fada70

    SHA512

    776b25ac20f85b8d1e5437712076818456f8bfff269af48090df4f592090b36676e2dce0e1d96837828f1860b443e51d7a9f4e0fac2dc52e15891735ce9eba48

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02665454.exe

    Filesize

    376KB

    MD5

    dc3ce220d105377f2e375105aaeb7419

    SHA1

    107f446f4528b614df9b602f0421e34c46880f9d

    SHA256

    3235d0cd1d10ba4e8f07441eab2e1f4e7fe6841687a052ff71f83acfb2fada70

    SHA512

    776b25ac20f85b8d1e5437712076818456f8bfff269af48090df4f592090b36676e2dce0e1d96837828f1860b443e51d7a9f4e0fac2dc52e15891735ce9eba48

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk591255.exe

    Filesize

    459KB

    MD5

    8cf476090e994af032a78648f7867c55

    SHA1

    e142d1da6ac5298014102718c5247b8e8edb4a59

    SHA256

    e1bfe550d0f350fe903c6e65b75d5a3317cc500ab0c343a5ba6229126539d142

    SHA512

    0189102b3e7322b76f70cf142b7ec1cea427c0f8f5baae0fb9ce3af1615508c90683bc3e8f74288fcf9ce2e16bff398a61845c1457201665ab35f92c0ddac284

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk591255.exe

    Filesize

    459KB

    MD5

    8cf476090e994af032a78648f7867c55

    SHA1

    e142d1da6ac5298014102718c5247b8e8edb4a59

    SHA256

    e1bfe550d0f350fe903c6e65b75d5a3317cc500ab0c343a5ba6229126539d142

    SHA512

    0189102b3e7322b76f70cf142b7ec1cea427c0f8f5baae0fb9ce3af1615508c90683bc3e8f74288fcf9ce2e16bff398a61845c1457201665ab35f92c0ddac284

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk591255.exe

    Filesize

    459KB

    MD5

    8cf476090e994af032a78648f7867c55

    SHA1

    e142d1da6ac5298014102718c5247b8e8edb4a59

    SHA256

    e1bfe550d0f350fe903c6e65b75d5a3317cc500ab0c343a5ba6229126539d142

    SHA512

    0189102b3e7322b76f70cf142b7ec1cea427c0f8f5baae0fb9ce3af1615508c90683bc3e8f74288fcf9ce2e16bff398a61845c1457201665ab35f92c0ddac284

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un819363.exe

    Filesize

    592KB

    MD5

    e5106c3b028a26679fac677edaca73e1

    SHA1

    5f1bf6775b57f1a0bc31026e44e89a0bda720c66

    SHA256

    7826f8d374112b426bedbf495d0d60d59173785a87ef3420d7e3712c7d2f62df

    SHA512

    687f2e2046b07509fbebea878152915176c1aa142c78346a22cbc65d8942151488ee763af6db3e7dfec0fb74fa08ef405512a12a490ed87a4fa482f0cb961cc3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un819363.exe

    Filesize

    592KB

    MD5

    e5106c3b028a26679fac677edaca73e1

    SHA1

    5f1bf6775b57f1a0bc31026e44e89a0bda720c66

    SHA256

    7826f8d374112b426bedbf495d0d60d59173785a87ef3420d7e3712c7d2f62df

    SHA512

    687f2e2046b07509fbebea878152915176c1aa142c78346a22cbc65d8942151488ee763af6db3e7dfec0fb74fa08ef405512a12a490ed87a4fa482f0cb961cc3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\02665454.exe

    Filesize

    376KB

    MD5

    dc3ce220d105377f2e375105aaeb7419

    SHA1

    107f446f4528b614df9b602f0421e34c46880f9d

    SHA256

    3235d0cd1d10ba4e8f07441eab2e1f4e7fe6841687a052ff71f83acfb2fada70

    SHA512

    776b25ac20f85b8d1e5437712076818456f8bfff269af48090df4f592090b36676e2dce0e1d96837828f1860b443e51d7a9f4e0fac2dc52e15891735ce9eba48

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\02665454.exe

    Filesize

    376KB

    MD5

    dc3ce220d105377f2e375105aaeb7419

    SHA1

    107f446f4528b614df9b602f0421e34c46880f9d

    SHA256

    3235d0cd1d10ba4e8f07441eab2e1f4e7fe6841687a052ff71f83acfb2fada70

    SHA512

    776b25ac20f85b8d1e5437712076818456f8bfff269af48090df4f592090b36676e2dce0e1d96837828f1860b443e51d7a9f4e0fac2dc52e15891735ce9eba48

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\02665454.exe

    Filesize

    376KB

    MD5

    dc3ce220d105377f2e375105aaeb7419

    SHA1

    107f446f4528b614df9b602f0421e34c46880f9d

    SHA256

    3235d0cd1d10ba4e8f07441eab2e1f4e7fe6841687a052ff71f83acfb2fada70

    SHA512

    776b25ac20f85b8d1e5437712076818456f8bfff269af48090df4f592090b36676e2dce0e1d96837828f1860b443e51d7a9f4e0fac2dc52e15891735ce9eba48

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk591255.exe

    Filesize

    459KB

    MD5

    8cf476090e994af032a78648f7867c55

    SHA1

    e142d1da6ac5298014102718c5247b8e8edb4a59

    SHA256

    e1bfe550d0f350fe903c6e65b75d5a3317cc500ab0c343a5ba6229126539d142

    SHA512

    0189102b3e7322b76f70cf142b7ec1cea427c0f8f5baae0fb9ce3af1615508c90683bc3e8f74288fcf9ce2e16bff398a61845c1457201665ab35f92c0ddac284

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk591255.exe

    Filesize

    459KB

    MD5

    8cf476090e994af032a78648f7867c55

    SHA1

    e142d1da6ac5298014102718c5247b8e8edb4a59

    SHA256

    e1bfe550d0f350fe903c6e65b75d5a3317cc500ab0c343a5ba6229126539d142

    SHA512

    0189102b3e7322b76f70cf142b7ec1cea427c0f8f5baae0fb9ce3af1615508c90683bc3e8f74288fcf9ce2e16bff398a61845c1457201665ab35f92c0ddac284

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk591255.exe

    Filesize

    459KB

    MD5

    8cf476090e994af032a78648f7867c55

    SHA1

    e142d1da6ac5298014102718c5247b8e8edb4a59

    SHA256

    e1bfe550d0f350fe903c6e65b75d5a3317cc500ab0c343a5ba6229126539d142

    SHA512

    0189102b3e7322b76f70cf142b7ec1cea427c0f8f5baae0fb9ce3af1615508c90683bc3e8f74288fcf9ce2e16bff398a61845c1457201665ab35f92c0ddac284

  • memory/660-112-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/660-91-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-89-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-101-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-99-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-107-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-105-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-103-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-97-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-95-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-87-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-110-0x0000000000920000-0x0000000000960000-memory.dmp

    Filesize

    256KB

  • memory/660-109-0x0000000000920000-0x0000000000960000-memory.dmp

    Filesize

    256KB

  • memory/660-111-0x0000000000920000-0x0000000000960000-memory.dmp

    Filesize

    256KB

  • memory/660-108-0x0000000000280000-0x00000000002AD000-memory.dmp

    Filesize

    180KB

  • memory/660-93-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-113-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/660-85-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-80-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-81-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-83-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/660-79-0x0000000000960000-0x0000000000978000-memory.dmp

    Filesize

    96KB

  • memory/660-78-0x0000000000810000-0x000000000082A000-memory.dmp

    Filesize

    104KB

  • memory/828-127-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-155-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-124-0x00000000023E0000-0x000000000241C000-memory.dmp

    Filesize

    240KB

  • memory/828-126-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-129-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-131-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-133-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-135-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-137-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-139-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-141-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-145-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-143-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-125-0x0000000002460000-0x000000000249A000-memory.dmp

    Filesize

    232KB

  • memory/828-153-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-151-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-159-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-157-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-149-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-147-0x0000000002460000-0x0000000002495000-memory.dmp

    Filesize

    212KB

  • memory/828-745-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/828-747-0x0000000004F50000-0x0000000004F90000-memory.dmp

    Filesize

    256KB

  • memory/828-749-0x0000000004F50000-0x0000000004F90000-memory.dmp

    Filesize

    256KB

  • memory/828-751-0x0000000004F50000-0x0000000004F90000-memory.dmp

    Filesize

    256KB

  • memory/828-922-0x0000000004F50000-0x0000000004F90000-memory.dmp

    Filesize

    256KB

  • memory/828-924-0x0000000004F50000-0x0000000004F90000-memory.dmp

    Filesize

    256KB

  • memory/828-925-0x0000000004F50000-0x0000000004F90000-memory.dmp

    Filesize

    256KB

  • memory/828-927-0x0000000004F50000-0x0000000004F90000-memory.dmp

    Filesize

    256KB