Analysis

  • max time kernel
    154s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:20

General

  • Target

    eb9e4e72eb3dc2e621aec6bab42372f0.exe

  • Size

    563KB

  • MD5

    eb9e4e72eb3dc2e621aec6bab42372f0

  • SHA1

    6adfe5c37b414c46cf735aaa89bfe3ddfa80f437

  • SHA256

    0c453eaa4c33712ee184604f3687d995fe665896da855341f50e508ea2acdf81

  • SHA512

    9f29e09f39d80c5b73773ba19fdc47bddbcb2b8680e7d4acfb2af7d7d8ad54ed8b50695b2d89c2f2053cba73acbb65ce96138db03a4719d36dd1b06f7cced071

  • SSDEEP

    12288:1y90QKkmaGisd2Uk+ucE7X9o9w7VtChXCPOIyfwa:1ygk9Id2+u17iwZkoPa

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb9e4e72eb3dc2e621aec6bab42372f0.exe
    "C:\Users\Admin\AppData\Local\Temp\eb9e4e72eb3dc2e621aec6bab42372f0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st701295.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st701295.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00788466.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00788466.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp224218.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp224218.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st701295.exe

    Filesize

    409KB

    MD5

    34f4f580e3664771cf7457a74db91337

    SHA1

    eb748b4e8f589fd205a5e818912dd94d92c0c4c9

    SHA256

    4f23b0a7e59505fdc821ac37507a56657676cbee8dfb0f0f32eedc817f63e392

    SHA512

    693c9088f52419b75d821129e513b5c0989e0eb4e67c3238e777af559b9e8f050586fdfcc9833ea2639488d2600d298c0a0f076c42f8c3571cb34df75298aad6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st701295.exe

    Filesize

    409KB

    MD5

    34f4f580e3664771cf7457a74db91337

    SHA1

    eb748b4e8f589fd205a5e818912dd94d92c0c4c9

    SHA256

    4f23b0a7e59505fdc821ac37507a56657676cbee8dfb0f0f32eedc817f63e392

    SHA512

    693c9088f52419b75d821129e513b5c0989e0eb4e67c3238e777af559b9e8f050586fdfcc9833ea2639488d2600d298c0a0f076c42f8c3571cb34df75298aad6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00788466.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00788466.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp224218.exe

    Filesize

    353KB

    MD5

    73cfc9bb651f8936d74808b7e055915c

    SHA1

    eb07e43139eda8e9d0fab723635d3f13a81c23a8

    SHA256

    dae817f801e1206dbf233bf1be535b917349186624ba59639ff20d9596cde643

    SHA512

    c8bf17d59bfe3ff787ff6198dcb980ffac6deb30abd85d0e0bf09b174b6130b67ee675aa08938e4233858e579cefaabe0c67a48418b23f946095d612dacdd586

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp224218.exe

    Filesize

    353KB

    MD5

    73cfc9bb651f8936d74808b7e055915c

    SHA1

    eb07e43139eda8e9d0fab723635d3f13a81c23a8

    SHA256

    dae817f801e1206dbf233bf1be535b917349186624ba59639ff20d9596cde643

    SHA512

    c8bf17d59bfe3ff787ff6198dcb980ffac6deb30abd85d0e0bf09b174b6130b67ee675aa08938e4233858e579cefaabe0c67a48418b23f946095d612dacdd586

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp224218.exe

    Filesize

    353KB

    MD5

    73cfc9bb651f8936d74808b7e055915c

    SHA1

    eb07e43139eda8e9d0fab723635d3f13a81c23a8

    SHA256

    dae817f801e1206dbf233bf1be535b917349186624ba59639ff20d9596cde643

    SHA512

    c8bf17d59bfe3ff787ff6198dcb980ffac6deb30abd85d0e0bf09b174b6130b67ee675aa08938e4233858e579cefaabe0c67a48418b23f946095d612dacdd586

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st701295.exe

    Filesize

    409KB

    MD5

    34f4f580e3664771cf7457a74db91337

    SHA1

    eb748b4e8f589fd205a5e818912dd94d92c0c4c9

    SHA256

    4f23b0a7e59505fdc821ac37507a56657676cbee8dfb0f0f32eedc817f63e392

    SHA512

    693c9088f52419b75d821129e513b5c0989e0eb4e67c3238e777af559b9e8f050586fdfcc9833ea2639488d2600d298c0a0f076c42f8c3571cb34df75298aad6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st701295.exe

    Filesize

    409KB

    MD5

    34f4f580e3664771cf7457a74db91337

    SHA1

    eb748b4e8f589fd205a5e818912dd94d92c0c4c9

    SHA256

    4f23b0a7e59505fdc821ac37507a56657676cbee8dfb0f0f32eedc817f63e392

    SHA512

    693c9088f52419b75d821129e513b5c0989e0eb4e67c3238e777af559b9e8f050586fdfcc9833ea2639488d2600d298c0a0f076c42f8c3571cb34df75298aad6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\00788466.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp224218.exe

    Filesize

    353KB

    MD5

    73cfc9bb651f8936d74808b7e055915c

    SHA1

    eb07e43139eda8e9d0fab723635d3f13a81c23a8

    SHA256

    dae817f801e1206dbf233bf1be535b917349186624ba59639ff20d9596cde643

    SHA512

    c8bf17d59bfe3ff787ff6198dcb980ffac6deb30abd85d0e0bf09b174b6130b67ee675aa08938e4233858e579cefaabe0c67a48418b23f946095d612dacdd586

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp224218.exe

    Filesize

    353KB

    MD5

    73cfc9bb651f8936d74808b7e055915c

    SHA1

    eb07e43139eda8e9d0fab723635d3f13a81c23a8

    SHA256

    dae817f801e1206dbf233bf1be535b917349186624ba59639ff20d9596cde643

    SHA512

    c8bf17d59bfe3ff787ff6198dcb980ffac6deb30abd85d0e0bf09b174b6130b67ee675aa08938e4233858e579cefaabe0c67a48418b23f946095d612dacdd586

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp224218.exe

    Filesize

    353KB

    MD5

    73cfc9bb651f8936d74808b7e055915c

    SHA1

    eb07e43139eda8e9d0fab723635d3f13a81c23a8

    SHA256

    dae817f801e1206dbf233bf1be535b917349186624ba59639ff20d9596cde643

    SHA512

    c8bf17d59bfe3ff787ff6198dcb980ffac6deb30abd85d0e0bf09b174b6130b67ee675aa08938e4233858e579cefaabe0c67a48418b23f946095d612dacdd586

  • memory/336-72-0x0000000000D00000-0x0000000000D0A000-memory.dmp

    Filesize

    40KB

  • memory/1724-103-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-117-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-85-0x0000000002CD0000-0x0000000002D0C000-memory.dmp

    Filesize

    240KB

  • memory/1724-86-0x0000000000400000-0x0000000002BB3000-memory.dmp

    Filesize

    39.7MB

  • memory/1724-87-0x0000000007520000-0x0000000007560000-memory.dmp

    Filesize

    256KB

  • memory/1724-88-0x0000000007520000-0x0000000007560000-memory.dmp

    Filesize

    256KB

  • memory/1724-89-0x0000000002D20000-0x0000000002D5A000-memory.dmp

    Filesize

    232KB

  • memory/1724-90-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-91-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-93-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-95-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-97-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-99-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-101-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-83-0x0000000000270000-0x00000000002B6000-memory.dmp

    Filesize

    280KB

  • memory/1724-105-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-107-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-109-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-111-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-113-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-115-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-84-0x0000000007520000-0x0000000007560000-memory.dmp

    Filesize

    256KB

  • memory/1724-119-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-121-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-123-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-125-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-127-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-129-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-133-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-131-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-135-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-137-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-141-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-139-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-143-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-145-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-147-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-149-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-151-0x0000000002D20000-0x0000000002D55000-memory.dmp

    Filesize

    212KB

  • memory/1724-883-0x0000000007520000-0x0000000007560000-memory.dmp

    Filesize

    256KB

  • memory/1724-884-0x0000000007520000-0x0000000007560000-memory.dmp

    Filesize

    256KB

  • memory/1724-885-0x0000000007520000-0x0000000007560000-memory.dmp

    Filesize

    256KB

  • memory/1724-887-0x0000000007520000-0x0000000007560000-memory.dmp

    Filesize

    256KB