Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 19:34

General

  • Target

    ca0159880946930876b67a710d1874a42d22f06b6a249d1401903c60e45bd4a2.exe

  • Size

    612KB

  • MD5

    e0e44b630069919b9adf5b6eaf95067c

  • SHA1

    e35f6ff213917dc3b201196c7a07246fb1cb30ca

  • SHA256

    ca0159880946930876b67a710d1874a42d22f06b6a249d1401903c60e45bd4a2

  • SHA512

    810c751e7eb17adfa072a5f1eb4a25633784eb54cdbb4b0d1bc50a1d1f9f78c0779b106cdf44dba32db93c557f79a4b77830f9248ce648ebbeb6e193235eebb7

  • SSDEEP

    12288:hy90CWZBD6mUGsE2a/6qgxawZpJLwq2c7E2APbRS:hy3W/L2a/62KpJMaAPbRS

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca0159880946930876b67a710d1874a42d22f06b6a249d1401903c60e45bd4a2.exe
    "C:\Users\Admin\AppData\Local\Temp\ca0159880946930876b67a710d1874a42d22f06b6a249d1401903c60e45bd4a2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st496071.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st496071.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39728528.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39728528.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420309.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420309.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st496071.exe

    Filesize

    457KB

    MD5

    fb797ba938b6a0c45fdd240ed58b3d8b

    SHA1

    816bd1de2f596f4f73ba0e4a00b9d68d8a36873f

    SHA256

    41131c7ee1910bbbd5574f608b8596493277db1b1ef0f76e35374b1d1329b320

    SHA512

    8be690eddf925bbc303e01ee58ab03c642bfafbe36fd545754f10efed7ee3cecfb51303529674e0f567b478f06e7fd3f2dbe8e821c333e1d0f39076f1b0252b4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st496071.exe

    Filesize

    457KB

    MD5

    fb797ba938b6a0c45fdd240ed58b3d8b

    SHA1

    816bd1de2f596f4f73ba0e4a00b9d68d8a36873f

    SHA256

    41131c7ee1910bbbd5574f608b8596493277db1b1ef0f76e35374b1d1329b320

    SHA512

    8be690eddf925bbc303e01ee58ab03c642bfafbe36fd545754f10efed7ee3cecfb51303529674e0f567b478f06e7fd3f2dbe8e821c333e1d0f39076f1b0252b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39728528.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39728528.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420309.exe

    Filesize

    459KB

    MD5

    2324910e58885b6b475f686ebbd1872c

    SHA1

    b66b211511403bdba60aaa72378e7105edba233c

    SHA256

    462686f760540c34dc632a1334b64efd6306ef56890c299d149b8f03efcff25f

    SHA512

    3ac24e600b573a2ab43226a18d5e346b96b496e6a5b2711f60756696060b299a207741f247be4d5811d68a5fba05cbc01a4b243438d64760083fa12f0e32e585

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420309.exe

    Filesize

    459KB

    MD5

    2324910e58885b6b475f686ebbd1872c

    SHA1

    b66b211511403bdba60aaa72378e7105edba233c

    SHA256

    462686f760540c34dc632a1334b64efd6306ef56890c299d149b8f03efcff25f

    SHA512

    3ac24e600b573a2ab43226a18d5e346b96b496e6a5b2711f60756696060b299a207741f247be4d5811d68a5fba05cbc01a4b243438d64760083fa12f0e32e585

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420309.exe

    Filesize

    459KB

    MD5

    2324910e58885b6b475f686ebbd1872c

    SHA1

    b66b211511403bdba60aaa72378e7105edba233c

    SHA256

    462686f760540c34dc632a1334b64efd6306ef56890c299d149b8f03efcff25f

    SHA512

    3ac24e600b573a2ab43226a18d5e346b96b496e6a5b2711f60756696060b299a207741f247be4d5811d68a5fba05cbc01a4b243438d64760083fa12f0e32e585

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st496071.exe

    Filesize

    457KB

    MD5

    fb797ba938b6a0c45fdd240ed58b3d8b

    SHA1

    816bd1de2f596f4f73ba0e4a00b9d68d8a36873f

    SHA256

    41131c7ee1910bbbd5574f608b8596493277db1b1ef0f76e35374b1d1329b320

    SHA512

    8be690eddf925bbc303e01ee58ab03c642bfafbe36fd545754f10efed7ee3cecfb51303529674e0f567b478f06e7fd3f2dbe8e821c333e1d0f39076f1b0252b4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st496071.exe

    Filesize

    457KB

    MD5

    fb797ba938b6a0c45fdd240ed58b3d8b

    SHA1

    816bd1de2f596f4f73ba0e4a00b9d68d8a36873f

    SHA256

    41131c7ee1910bbbd5574f608b8596493277db1b1ef0f76e35374b1d1329b320

    SHA512

    8be690eddf925bbc303e01ee58ab03c642bfafbe36fd545754f10efed7ee3cecfb51303529674e0f567b478f06e7fd3f2dbe8e821c333e1d0f39076f1b0252b4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\39728528.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420309.exe

    Filesize

    459KB

    MD5

    2324910e58885b6b475f686ebbd1872c

    SHA1

    b66b211511403bdba60aaa72378e7105edba233c

    SHA256

    462686f760540c34dc632a1334b64efd6306ef56890c299d149b8f03efcff25f

    SHA512

    3ac24e600b573a2ab43226a18d5e346b96b496e6a5b2711f60756696060b299a207741f247be4d5811d68a5fba05cbc01a4b243438d64760083fa12f0e32e585

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420309.exe

    Filesize

    459KB

    MD5

    2324910e58885b6b475f686ebbd1872c

    SHA1

    b66b211511403bdba60aaa72378e7105edba233c

    SHA256

    462686f760540c34dc632a1334b64efd6306ef56890c299d149b8f03efcff25f

    SHA512

    3ac24e600b573a2ab43226a18d5e346b96b496e6a5b2711f60756696060b299a207741f247be4d5811d68a5fba05cbc01a4b243438d64760083fa12f0e32e585

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420309.exe

    Filesize

    459KB

    MD5

    2324910e58885b6b475f686ebbd1872c

    SHA1

    b66b211511403bdba60aaa72378e7105edba233c

    SHA256

    462686f760540c34dc632a1334b64efd6306ef56890c299d149b8f03efcff25f

    SHA512

    3ac24e600b573a2ab43226a18d5e346b96b496e6a5b2711f60756696060b299a207741f247be4d5811d68a5fba05cbc01a4b243438d64760083fa12f0e32e585

  • memory/944-100-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-114-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-84-0x00000000025C0000-0x00000000025FC000-memory.dmp

    Filesize

    240KB

  • memory/944-85-0x0000000002450000-0x0000000002490000-memory.dmp

    Filesize

    256KB

  • memory/944-86-0x0000000002450000-0x0000000002490000-memory.dmp

    Filesize

    256KB

  • memory/944-87-0x0000000000400000-0x0000000000817000-memory.dmp

    Filesize

    4.1MB

  • memory/944-88-0x0000000002650000-0x000000000268A000-memory.dmp

    Filesize

    232KB

  • memory/944-89-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-90-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-92-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-94-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-96-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-98-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-884-0x0000000002450000-0x0000000002490000-memory.dmp

    Filesize

    256KB

  • memory/944-102-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-104-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-108-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-110-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-106-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-112-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-116-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-83-0x0000000000390000-0x00000000003D6000-memory.dmp

    Filesize

    280KB

  • memory/944-118-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-120-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-122-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-124-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-126-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-128-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-130-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-132-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-134-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-138-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-136-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-140-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-142-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-144-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-146-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-148-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-150-0x0000000002650000-0x0000000002685000-memory.dmp

    Filesize

    212KB

  • memory/944-882-0x0000000002450000-0x0000000002490000-memory.dmp

    Filesize

    256KB

  • memory/2004-72-0x0000000001000000-0x000000000100A000-memory.dmp

    Filesize

    40KB