Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:28

General

  • Target

    f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe

  • Size

    695KB

  • MD5

    48fd845cfc42eb2c4dc4cb03c23b27c8

  • SHA1

    3dc94ca3d3de1979949d0440cdc8103cff8064c6

  • SHA256

    f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec

  • SHA512

    fe3ee9eae6f79dbedea2d4ad6796d678bdae181a6be06c92876d7fc29de6359d907ae330d48727575ae26ea6129f83b5fc3996b04b000e38509f5a64a440af4d

  • SSDEEP

    12288:cy90kUn4MnLH7mFrehcUXUdun1Jr2Kix3xTHQq8sXowQDySyUdJOvmxQAE:cyBUnlnTaVehc23nqBxhTHQ1s4wQ7Aog

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe
    "C:\Users\Admin\AppData\Local\Temp\f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1672

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe

          Filesize

          541KB

          MD5

          8164882881ededdf303d24ac9bb0324e

          SHA1

          d0d4beffc960cdc16706f8702597a7979794d0c4

          SHA256

          70a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b

          SHA512

          aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe

          Filesize

          541KB

          MD5

          8164882881ededdf303d24ac9bb0324e

          SHA1

          d0d4beffc960cdc16706f8702597a7979794d0c4

          SHA256

          70a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b

          SHA512

          aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

          Filesize

          258KB

          MD5

          c671d754003666106ee51a7020e62adb

          SHA1

          6c05148cf75558a82598fd8357c86ed6bdcc9063

          SHA256

          1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

          SHA512

          5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

          Filesize

          258KB

          MD5

          c671d754003666106ee51a7020e62adb

          SHA1

          6c05148cf75558a82598fd8357c86ed6bdcc9063

          SHA256

          1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

          SHA512

          5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

          Filesize

          258KB

          MD5

          c671d754003666106ee51a7020e62adb

          SHA1

          6c05148cf75558a82598fd8357c86ed6bdcc9063

          SHA256

          1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

          SHA512

          5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

          Filesize

          340KB

          MD5

          b383cd533b43586dcabf78c4407c2c75

          SHA1

          7dd51a068af50c5887d0cf3f5fda4c029c50aea5

          SHA256

          31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

          SHA512

          50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

          Filesize

          340KB

          MD5

          b383cd533b43586dcabf78c4407c2c75

          SHA1

          7dd51a068af50c5887d0cf3f5fda4c029c50aea5

          SHA256

          31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

          SHA512

          50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

          Filesize

          340KB

          MD5

          b383cd533b43586dcabf78c4407c2c75

          SHA1

          7dd51a068af50c5887d0cf3f5fda4c029c50aea5

          SHA256

          31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

          SHA512

          50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe

          Filesize

          541KB

          MD5

          8164882881ededdf303d24ac9bb0324e

          SHA1

          d0d4beffc960cdc16706f8702597a7979794d0c4

          SHA256

          70a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b

          SHA512

          aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe

          Filesize

          541KB

          MD5

          8164882881ededdf303d24ac9bb0324e

          SHA1

          d0d4beffc960cdc16706f8702597a7979794d0c4

          SHA256

          70a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b

          SHA512

          aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

          Filesize

          258KB

          MD5

          c671d754003666106ee51a7020e62adb

          SHA1

          6c05148cf75558a82598fd8357c86ed6bdcc9063

          SHA256

          1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

          SHA512

          5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

          Filesize

          258KB

          MD5

          c671d754003666106ee51a7020e62adb

          SHA1

          6c05148cf75558a82598fd8357c86ed6bdcc9063

          SHA256

          1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

          SHA512

          5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

          Filesize

          258KB

          MD5

          c671d754003666106ee51a7020e62adb

          SHA1

          6c05148cf75558a82598fd8357c86ed6bdcc9063

          SHA256

          1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

          SHA512

          5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

          Filesize

          340KB

          MD5

          b383cd533b43586dcabf78c4407c2c75

          SHA1

          7dd51a068af50c5887d0cf3f5fda4c029c50aea5

          SHA256

          31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

          SHA512

          50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

          Filesize

          340KB

          MD5

          b383cd533b43586dcabf78c4407c2c75

          SHA1

          7dd51a068af50c5887d0cf3f5fda4c029c50aea5

          SHA256

          31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

          SHA512

          50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

          Filesize

          340KB

          MD5

          b383cd533b43586dcabf78c4407c2c75

          SHA1

          7dd51a068af50c5887d0cf3f5fda4c029c50aea5

          SHA256

          31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

          SHA512

          50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

        • memory/468-110-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/468-87-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-89-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-91-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-93-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-95-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-97-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-99-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-101-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-105-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-103-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-109-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-107-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-85-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-114-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/468-83-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-82-0x00000000032E0000-0x00000000032F3000-memory.dmp

          Filesize

          76KB

        • memory/468-80-0x0000000000240000-0x000000000026D000-memory.dmp

          Filesize

          180KB

        • memory/468-81-0x0000000007270000-0x00000000072B0000-memory.dmp

          Filesize

          256KB

        • memory/468-79-0x00000000032E0000-0x00000000032F8000-memory.dmp

          Filesize

          96KB

        • memory/468-78-0x0000000002C20000-0x0000000002C3A000-memory.dmp

          Filesize

          104KB

        • memory/1672-127-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-150-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-125-0x0000000004660000-0x000000000469C000-memory.dmp

          Filesize

          240KB

        • memory/1672-128-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-130-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-132-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-134-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-136-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-138-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-140-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-142-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-144-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-146-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-126-0x00000000046A0000-0x00000000046DA000-memory.dmp

          Filesize

          232KB

        • memory/1672-148-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-152-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-156-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-154-0x00000000046A0000-0x00000000046D5000-memory.dmp

          Filesize

          212KB

        • memory/1672-526-0x0000000000240000-0x0000000000286000-memory.dmp

          Filesize

          280KB

        • memory/1672-528-0x0000000007230000-0x0000000007270000-memory.dmp

          Filesize

          256KB

        • memory/1672-530-0x0000000007230000-0x0000000007270000-memory.dmp

          Filesize

          256KB

        • memory/1672-532-0x0000000007230000-0x0000000007270000-memory.dmp

          Filesize

          256KB

        • memory/1672-923-0x0000000007230000-0x0000000007270000-memory.dmp

          Filesize

          256KB

        • memory/1672-925-0x0000000007230000-0x0000000007270000-memory.dmp

          Filesize

          256KB

        • memory/1672-926-0x0000000007230000-0x0000000007270000-memory.dmp

          Filesize

          256KB

        • memory/1672-928-0x0000000007230000-0x0000000007270000-memory.dmp

          Filesize

          256KB