Analysis

  • max time kernel
    152s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:19

General

  • Target

    ea9f717b3f9c8cfee3f93e8dd1d9f5e6cb1353eff9c8f271e414f538a3bb7d03.exe

  • Size

    694KB

  • MD5

    6f73c191a90bab6416e827bcea2784f9

  • SHA1

    c549fdf3ec56b876cbc8d25eef4dac8f76b94a71

  • SHA256

    ea9f717b3f9c8cfee3f93e8dd1d9f5e6cb1353eff9c8f271e414f538a3bb7d03

  • SHA512

    049f04bde809cc52d8c960dab77b67b4d57f4e0b6b259788000eb91a95cc161d14ca2915472f8730f460712a9048a1420ec1a6c6780d61af57972549d722c790

  • SSDEEP

    12288:Gy90W2BlEtuvaLOodZfvU6+2+m+drSK1gmzQVZRhu1Hb0iDQe7vkySS3Vo:Gy12BSuCqodlvU6z+d/+mzmjKIDe7vkD

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea9f717b3f9c8cfee3f93e8dd1d9f5e6cb1353eff9c8f271e414f538a3bb7d03.exe
    "C:\Users\Admin\AppData\Local\Temp\ea9f717b3f9c8cfee3f93e8dd1d9f5e6cb1353eff9c8f271e414f538a3bb7d03.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un576391.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un576391.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26539906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26539906.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk215950.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk215950.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1392

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un576391.exe

          Filesize

          540KB

          MD5

          7dc21997994234fb7fdeb9850b91a6a4

          SHA1

          8bd3b1cf03a6c961f70f863a1d1ee31a4dfb515b

          SHA256

          0552020d24e6aa3e5bd1f3c6ca2dfbc2ca3d74191eb55dadbfdd1fa80e8b0280

          SHA512

          d8b0320ea0da5f39d42628f120a8181d0b154085e5e9e117e5b1ece33e47bcdb7302af3ad5ae7438dce9ce68e065134da2a9d3e9b74934cfe68fff3f5da89061

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un576391.exe

          Filesize

          540KB

          MD5

          7dc21997994234fb7fdeb9850b91a6a4

          SHA1

          8bd3b1cf03a6c961f70f863a1d1ee31a4dfb515b

          SHA256

          0552020d24e6aa3e5bd1f3c6ca2dfbc2ca3d74191eb55dadbfdd1fa80e8b0280

          SHA512

          d8b0320ea0da5f39d42628f120a8181d0b154085e5e9e117e5b1ece33e47bcdb7302af3ad5ae7438dce9ce68e065134da2a9d3e9b74934cfe68fff3f5da89061

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26539906.exe

          Filesize

          264KB

          MD5

          88cd6992bf5c0dd057c6ddb40a70593a

          SHA1

          8ec79028bc30e0f5fe35268e6780ec730acd0795

          SHA256

          0899e377d7399286b54ae5cc1970725c29771cee164c36eade2901a878b2f0ac

          SHA512

          ae763947de60e0b1865cee558320b5b7f50e59ee78595c44fb3944f9cbccf8c61e22c17c60f117e49de5a69f2e65aa3fbf1d463cc37a0b94b4458931e92bd2be

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26539906.exe

          Filesize

          264KB

          MD5

          88cd6992bf5c0dd057c6ddb40a70593a

          SHA1

          8ec79028bc30e0f5fe35268e6780ec730acd0795

          SHA256

          0899e377d7399286b54ae5cc1970725c29771cee164c36eade2901a878b2f0ac

          SHA512

          ae763947de60e0b1865cee558320b5b7f50e59ee78595c44fb3944f9cbccf8c61e22c17c60f117e49de5a69f2e65aa3fbf1d463cc37a0b94b4458931e92bd2be

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26539906.exe

          Filesize

          264KB

          MD5

          88cd6992bf5c0dd057c6ddb40a70593a

          SHA1

          8ec79028bc30e0f5fe35268e6780ec730acd0795

          SHA256

          0899e377d7399286b54ae5cc1970725c29771cee164c36eade2901a878b2f0ac

          SHA512

          ae763947de60e0b1865cee558320b5b7f50e59ee78595c44fb3944f9cbccf8c61e22c17c60f117e49de5a69f2e65aa3fbf1d463cc37a0b94b4458931e92bd2be

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk215950.exe

          Filesize

          348KB

          MD5

          419efc170a1992feae8e3eef5f5bbf94

          SHA1

          15a6fdee14787070a82cfb7d33bf1521c1bf66f3

          SHA256

          134b7cac8b496b6b152aa6fc7788b1c93b5ba5d1cc669d23f6db8201b277ff74

          SHA512

          68a1f10cd1f6aeef8b936b3b7635c966862ef6f5b34a7539e59fb193adc9011e3e95a4e84792b2b61fad6b2609b6996fd4d8f70a1782e7417646cd3b4bd2230e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk215950.exe

          Filesize

          348KB

          MD5

          419efc170a1992feae8e3eef5f5bbf94

          SHA1

          15a6fdee14787070a82cfb7d33bf1521c1bf66f3

          SHA256

          134b7cac8b496b6b152aa6fc7788b1c93b5ba5d1cc669d23f6db8201b277ff74

          SHA512

          68a1f10cd1f6aeef8b936b3b7635c966862ef6f5b34a7539e59fb193adc9011e3e95a4e84792b2b61fad6b2609b6996fd4d8f70a1782e7417646cd3b4bd2230e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk215950.exe

          Filesize

          348KB

          MD5

          419efc170a1992feae8e3eef5f5bbf94

          SHA1

          15a6fdee14787070a82cfb7d33bf1521c1bf66f3

          SHA256

          134b7cac8b496b6b152aa6fc7788b1c93b5ba5d1cc669d23f6db8201b277ff74

          SHA512

          68a1f10cd1f6aeef8b936b3b7635c966862ef6f5b34a7539e59fb193adc9011e3e95a4e84792b2b61fad6b2609b6996fd4d8f70a1782e7417646cd3b4bd2230e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un576391.exe

          Filesize

          540KB

          MD5

          7dc21997994234fb7fdeb9850b91a6a4

          SHA1

          8bd3b1cf03a6c961f70f863a1d1ee31a4dfb515b

          SHA256

          0552020d24e6aa3e5bd1f3c6ca2dfbc2ca3d74191eb55dadbfdd1fa80e8b0280

          SHA512

          d8b0320ea0da5f39d42628f120a8181d0b154085e5e9e117e5b1ece33e47bcdb7302af3ad5ae7438dce9ce68e065134da2a9d3e9b74934cfe68fff3f5da89061

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un576391.exe

          Filesize

          540KB

          MD5

          7dc21997994234fb7fdeb9850b91a6a4

          SHA1

          8bd3b1cf03a6c961f70f863a1d1ee31a4dfb515b

          SHA256

          0552020d24e6aa3e5bd1f3c6ca2dfbc2ca3d74191eb55dadbfdd1fa80e8b0280

          SHA512

          d8b0320ea0da5f39d42628f120a8181d0b154085e5e9e117e5b1ece33e47bcdb7302af3ad5ae7438dce9ce68e065134da2a9d3e9b74934cfe68fff3f5da89061

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\26539906.exe

          Filesize

          264KB

          MD5

          88cd6992bf5c0dd057c6ddb40a70593a

          SHA1

          8ec79028bc30e0f5fe35268e6780ec730acd0795

          SHA256

          0899e377d7399286b54ae5cc1970725c29771cee164c36eade2901a878b2f0ac

          SHA512

          ae763947de60e0b1865cee558320b5b7f50e59ee78595c44fb3944f9cbccf8c61e22c17c60f117e49de5a69f2e65aa3fbf1d463cc37a0b94b4458931e92bd2be

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\26539906.exe

          Filesize

          264KB

          MD5

          88cd6992bf5c0dd057c6ddb40a70593a

          SHA1

          8ec79028bc30e0f5fe35268e6780ec730acd0795

          SHA256

          0899e377d7399286b54ae5cc1970725c29771cee164c36eade2901a878b2f0ac

          SHA512

          ae763947de60e0b1865cee558320b5b7f50e59ee78595c44fb3944f9cbccf8c61e22c17c60f117e49de5a69f2e65aa3fbf1d463cc37a0b94b4458931e92bd2be

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\26539906.exe

          Filesize

          264KB

          MD5

          88cd6992bf5c0dd057c6ddb40a70593a

          SHA1

          8ec79028bc30e0f5fe35268e6780ec730acd0795

          SHA256

          0899e377d7399286b54ae5cc1970725c29771cee164c36eade2901a878b2f0ac

          SHA512

          ae763947de60e0b1865cee558320b5b7f50e59ee78595c44fb3944f9cbccf8c61e22c17c60f117e49de5a69f2e65aa3fbf1d463cc37a0b94b4458931e92bd2be

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk215950.exe

          Filesize

          348KB

          MD5

          419efc170a1992feae8e3eef5f5bbf94

          SHA1

          15a6fdee14787070a82cfb7d33bf1521c1bf66f3

          SHA256

          134b7cac8b496b6b152aa6fc7788b1c93b5ba5d1cc669d23f6db8201b277ff74

          SHA512

          68a1f10cd1f6aeef8b936b3b7635c966862ef6f5b34a7539e59fb193adc9011e3e95a4e84792b2b61fad6b2609b6996fd4d8f70a1782e7417646cd3b4bd2230e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk215950.exe

          Filesize

          348KB

          MD5

          419efc170a1992feae8e3eef5f5bbf94

          SHA1

          15a6fdee14787070a82cfb7d33bf1521c1bf66f3

          SHA256

          134b7cac8b496b6b152aa6fc7788b1c93b5ba5d1cc669d23f6db8201b277ff74

          SHA512

          68a1f10cd1f6aeef8b936b3b7635c966862ef6f5b34a7539e59fb193adc9011e3e95a4e84792b2b61fad6b2609b6996fd4d8f70a1782e7417646cd3b4bd2230e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk215950.exe

          Filesize

          348KB

          MD5

          419efc170a1992feae8e3eef5f5bbf94

          SHA1

          15a6fdee14787070a82cfb7d33bf1521c1bf66f3

          SHA256

          134b7cac8b496b6b152aa6fc7788b1c93b5ba5d1cc669d23f6db8201b277ff74

          SHA512

          68a1f10cd1f6aeef8b936b3b7635c966862ef6f5b34a7539e59fb193adc9011e3e95a4e84792b2b61fad6b2609b6996fd4d8f70a1782e7417646cd3b4bd2230e

        • memory/792-115-0x00000000072F0000-0x0000000007330000-memory.dmp

          Filesize

          256KB

        • memory/792-87-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-88-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-100-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-98-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-96-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-94-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-92-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-90-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-104-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-102-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-106-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-108-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-112-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-110-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-114-0x0000000003100000-0x0000000003113000-memory.dmp

          Filesize

          76KB

        • memory/792-86-0x0000000003100000-0x0000000003118000-memory.dmp

          Filesize

          96KB

        • memory/792-117-0x0000000000400000-0x0000000002B9D000-memory.dmp

          Filesize

          39.6MB

        • memory/792-85-0x00000000072F0000-0x0000000007330000-memory.dmp

          Filesize

          256KB

        • memory/792-83-0x00000000072F0000-0x0000000007330000-memory.dmp

          Filesize

          256KB

        • memory/792-81-0x0000000000400000-0x0000000002B9D000-memory.dmp

          Filesize

          39.6MB

        • memory/792-80-0x00000000072F0000-0x0000000007330000-memory.dmp

          Filesize

          256KB

        • memory/792-79-0x0000000000270000-0x000000000029D000-memory.dmp

          Filesize

          180KB

        • memory/792-78-0x0000000003060000-0x000000000307A000-memory.dmp

          Filesize

          104KB

        • memory/1392-129-0x0000000004700000-0x000000000473A000-memory.dmp

          Filesize

          232KB

        • memory/1392-151-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-130-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-131-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-133-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-135-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-137-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-139-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-141-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-143-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-145-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-147-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-149-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-128-0x00000000046C0000-0x00000000046FC000-memory.dmp

          Filesize

          240KB

        • memory/1392-153-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-155-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-157-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-159-0x0000000004700000-0x0000000004735000-memory.dmp

          Filesize

          212KB

        • memory/1392-531-0x0000000002F60000-0x0000000002FA6000-memory.dmp

          Filesize

          280KB

        • memory/1392-533-0x0000000007220000-0x0000000007260000-memory.dmp

          Filesize

          256KB

        • memory/1392-535-0x0000000007220000-0x0000000007260000-memory.dmp

          Filesize

          256KB

        • memory/1392-925-0x0000000007220000-0x0000000007260000-memory.dmp

          Filesize

          256KB

        • memory/1392-928-0x0000000007220000-0x0000000007260000-memory.dmp

          Filesize

          256KB

        • memory/1392-929-0x0000000007220000-0x0000000007260000-memory.dmp

          Filesize

          256KB

        • memory/1392-930-0x0000000007220000-0x0000000007260000-memory.dmp

          Filesize

          256KB