Analysis

  • max time kernel
    237s
  • max time network
    326s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 19:36

General

  • Target

    cb2166ddc688e2586b9251e4130a329f4e35cb6e67c1e2476c27f7ebdff730c0.exe

  • Size

    747KB

  • MD5

    d924a55ec29e05f40aeb634c8161d5b7

  • SHA1

    7231e4bdd82d29695705e25b55ce897d07007fc0

  • SHA256

    cb2166ddc688e2586b9251e4130a329f4e35cb6e67c1e2476c27f7ebdff730c0

  • SHA512

    a90816dab3ba73bb9834a57a377748ae66be4a1a0ee292c8ef0a31d21ceeaf51d9fb72202edb7ddd86731a19480731c563863ca6069444a4d8316a98905f1342

  • SSDEEP

    12288:+y90Vhbh2NFxAnGn7kZO8f5xUhR32Dcj7skCCShYIifRrCNzHgcNr:+yy5h2HxA67p8fUb2Dc0DhpifNCf

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb2166ddc688e2586b9251e4130a329f4e35cb6e67c1e2476c27f7ebdff730c0.exe
    "C:\Users\Admin\AppData\Local\Temp\cb2166ddc688e2586b9251e4130a329f4e35cb6e67c1e2476c27f7ebdff730c0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un445002.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un445002.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06850179.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06850179.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218920.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218920.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un445002.exe

    Filesize

    593KB

    MD5

    c814647f90eee36c3cd515cc12e795c3

    SHA1

    df4ce1b46a4b519bc2010bbb0391f77a6d774be7

    SHA256

    b863c4dab60f3bcf8c110056522ae8c4067dfaea25a0a85fbe46bab22355e8c6

    SHA512

    69c5ffcbbafcc7aeb2927e5cae321cfdef5a7d31684c176e8977f0959e4b70ad4a782077db857a6d342262bf31038142b7ac064ffe97309fe2368114ae064916

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un445002.exe

    Filesize

    593KB

    MD5

    c814647f90eee36c3cd515cc12e795c3

    SHA1

    df4ce1b46a4b519bc2010bbb0391f77a6d774be7

    SHA256

    b863c4dab60f3bcf8c110056522ae8c4067dfaea25a0a85fbe46bab22355e8c6

    SHA512

    69c5ffcbbafcc7aeb2927e5cae321cfdef5a7d31684c176e8977f0959e4b70ad4a782077db857a6d342262bf31038142b7ac064ffe97309fe2368114ae064916

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06850179.exe

    Filesize

    377KB

    MD5

    fa413c6b90d44d41bb4fce54ff427dcb

    SHA1

    de3d27ba36c8fb222fb6cf832958bb39e006f53c

    SHA256

    503673e9dd138b99b72a8cebe3da740df4ff3618dc20c5b42873d95945efb49a

    SHA512

    a05c34760e04e28a5e2026392742684ac24d3e359a3fb2874f8afa74035ea606c202255c2c988f0e6fb21d314a4f3fca5570908581ae2a123dda85ea341b6bdf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06850179.exe

    Filesize

    377KB

    MD5

    fa413c6b90d44d41bb4fce54ff427dcb

    SHA1

    de3d27ba36c8fb222fb6cf832958bb39e006f53c

    SHA256

    503673e9dd138b99b72a8cebe3da740df4ff3618dc20c5b42873d95945efb49a

    SHA512

    a05c34760e04e28a5e2026392742684ac24d3e359a3fb2874f8afa74035ea606c202255c2c988f0e6fb21d314a4f3fca5570908581ae2a123dda85ea341b6bdf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06850179.exe

    Filesize

    377KB

    MD5

    fa413c6b90d44d41bb4fce54ff427dcb

    SHA1

    de3d27ba36c8fb222fb6cf832958bb39e006f53c

    SHA256

    503673e9dd138b99b72a8cebe3da740df4ff3618dc20c5b42873d95945efb49a

    SHA512

    a05c34760e04e28a5e2026392742684ac24d3e359a3fb2874f8afa74035ea606c202255c2c988f0e6fb21d314a4f3fca5570908581ae2a123dda85ea341b6bdf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218920.exe

    Filesize

    459KB

    MD5

    30ce12d61b3054cb9145673e0932c89c

    SHA1

    2d80c81b4ffed4ea61f58977701ecc86facfcbb5

    SHA256

    24d75260f70cb9c98046b5abb22bea2a9c0cfac2445d4915194b74907c97f0ed

    SHA512

    723f494881fb1fccb59b4dd60a58dbdbf077c86d427bd8d665555439e46bb5107bfb28f75e39ede48c117c9f1775f137ef55f5cb5781377ecca7b7dbb4c475df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218920.exe

    Filesize

    459KB

    MD5

    30ce12d61b3054cb9145673e0932c89c

    SHA1

    2d80c81b4ffed4ea61f58977701ecc86facfcbb5

    SHA256

    24d75260f70cb9c98046b5abb22bea2a9c0cfac2445d4915194b74907c97f0ed

    SHA512

    723f494881fb1fccb59b4dd60a58dbdbf077c86d427bd8d665555439e46bb5107bfb28f75e39ede48c117c9f1775f137ef55f5cb5781377ecca7b7dbb4c475df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218920.exe

    Filesize

    459KB

    MD5

    30ce12d61b3054cb9145673e0932c89c

    SHA1

    2d80c81b4ffed4ea61f58977701ecc86facfcbb5

    SHA256

    24d75260f70cb9c98046b5abb22bea2a9c0cfac2445d4915194b74907c97f0ed

    SHA512

    723f494881fb1fccb59b4dd60a58dbdbf077c86d427bd8d665555439e46bb5107bfb28f75e39ede48c117c9f1775f137ef55f5cb5781377ecca7b7dbb4c475df

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un445002.exe

    Filesize

    593KB

    MD5

    c814647f90eee36c3cd515cc12e795c3

    SHA1

    df4ce1b46a4b519bc2010bbb0391f77a6d774be7

    SHA256

    b863c4dab60f3bcf8c110056522ae8c4067dfaea25a0a85fbe46bab22355e8c6

    SHA512

    69c5ffcbbafcc7aeb2927e5cae321cfdef5a7d31684c176e8977f0959e4b70ad4a782077db857a6d342262bf31038142b7ac064ffe97309fe2368114ae064916

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un445002.exe

    Filesize

    593KB

    MD5

    c814647f90eee36c3cd515cc12e795c3

    SHA1

    df4ce1b46a4b519bc2010bbb0391f77a6d774be7

    SHA256

    b863c4dab60f3bcf8c110056522ae8c4067dfaea25a0a85fbe46bab22355e8c6

    SHA512

    69c5ffcbbafcc7aeb2927e5cae321cfdef5a7d31684c176e8977f0959e4b70ad4a782077db857a6d342262bf31038142b7ac064ffe97309fe2368114ae064916

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\06850179.exe

    Filesize

    377KB

    MD5

    fa413c6b90d44d41bb4fce54ff427dcb

    SHA1

    de3d27ba36c8fb222fb6cf832958bb39e006f53c

    SHA256

    503673e9dd138b99b72a8cebe3da740df4ff3618dc20c5b42873d95945efb49a

    SHA512

    a05c34760e04e28a5e2026392742684ac24d3e359a3fb2874f8afa74035ea606c202255c2c988f0e6fb21d314a4f3fca5570908581ae2a123dda85ea341b6bdf

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\06850179.exe

    Filesize

    377KB

    MD5

    fa413c6b90d44d41bb4fce54ff427dcb

    SHA1

    de3d27ba36c8fb222fb6cf832958bb39e006f53c

    SHA256

    503673e9dd138b99b72a8cebe3da740df4ff3618dc20c5b42873d95945efb49a

    SHA512

    a05c34760e04e28a5e2026392742684ac24d3e359a3fb2874f8afa74035ea606c202255c2c988f0e6fb21d314a4f3fca5570908581ae2a123dda85ea341b6bdf

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\06850179.exe

    Filesize

    377KB

    MD5

    fa413c6b90d44d41bb4fce54ff427dcb

    SHA1

    de3d27ba36c8fb222fb6cf832958bb39e006f53c

    SHA256

    503673e9dd138b99b72a8cebe3da740df4ff3618dc20c5b42873d95945efb49a

    SHA512

    a05c34760e04e28a5e2026392742684ac24d3e359a3fb2874f8afa74035ea606c202255c2c988f0e6fb21d314a4f3fca5570908581ae2a123dda85ea341b6bdf

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218920.exe

    Filesize

    459KB

    MD5

    30ce12d61b3054cb9145673e0932c89c

    SHA1

    2d80c81b4ffed4ea61f58977701ecc86facfcbb5

    SHA256

    24d75260f70cb9c98046b5abb22bea2a9c0cfac2445d4915194b74907c97f0ed

    SHA512

    723f494881fb1fccb59b4dd60a58dbdbf077c86d427bd8d665555439e46bb5107bfb28f75e39ede48c117c9f1775f137ef55f5cb5781377ecca7b7dbb4c475df

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218920.exe

    Filesize

    459KB

    MD5

    30ce12d61b3054cb9145673e0932c89c

    SHA1

    2d80c81b4ffed4ea61f58977701ecc86facfcbb5

    SHA256

    24d75260f70cb9c98046b5abb22bea2a9c0cfac2445d4915194b74907c97f0ed

    SHA512

    723f494881fb1fccb59b4dd60a58dbdbf077c86d427bd8d665555439e46bb5107bfb28f75e39ede48c117c9f1775f137ef55f5cb5781377ecca7b7dbb4c475df

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218920.exe

    Filesize

    459KB

    MD5

    30ce12d61b3054cb9145673e0932c89c

    SHA1

    2d80c81b4ffed4ea61f58977701ecc86facfcbb5

    SHA256

    24d75260f70cb9c98046b5abb22bea2a9c0cfac2445d4915194b74907c97f0ed

    SHA512

    723f494881fb1fccb59b4dd60a58dbdbf077c86d427bd8d665555439e46bb5107bfb28f75e39ede48c117c9f1775f137ef55f5cb5781377ecca7b7dbb4c475df

  • memory/956-160-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-142-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-254-0x0000000000290000-0x00000000002D6000-memory.dmp

    Filesize

    280KB

  • memory/956-162-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-130-0x0000000000EF0000-0x0000000000F2A000-memory.dmp

    Filesize

    232KB

  • memory/956-158-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-156-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-154-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-152-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-150-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-148-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-146-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-144-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-255-0x0000000004EC0000-0x0000000004F00000-memory.dmp

    Filesize

    256KB

  • memory/956-140-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-138-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-136-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-134-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-132-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-131-0x0000000000EF0000-0x0000000000F25000-memory.dmp

    Filesize

    212KB

  • memory/956-257-0x0000000004EC0000-0x0000000004F00000-memory.dmp

    Filesize

    256KB

  • memory/956-259-0x0000000004EC0000-0x0000000004F00000-memory.dmp

    Filesize

    256KB

  • memory/956-928-0x0000000004EC0000-0x0000000004F00000-memory.dmp

    Filesize

    256KB

  • memory/956-929-0x0000000004EC0000-0x0000000004F00000-memory.dmp

    Filesize

    256KB

  • memory/956-930-0x0000000004EC0000-0x0000000004F00000-memory.dmp

    Filesize

    256KB

  • memory/956-933-0x0000000004EC0000-0x0000000004F00000-memory.dmp

    Filesize

    256KB

  • memory/956-129-0x0000000000BF0000-0x0000000000C2C000-memory.dmp

    Filesize

    240KB

  • memory/1608-87-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-118-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1608-116-0x0000000004D50000-0x0000000004D90000-memory.dmp

    Filesize

    256KB

  • memory/1608-115-0x0000000004D50000-0x0000000004D90000-memory.dmp

    Filesize

    256KB

  • memory/1608-114-0x0000000004D50000-0x0000000004D90000-memory.dmp

    Filesize

    256KB

  • memory/1608-112-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1608-111-0x0000000004D50000-0x0000000004D90000-memory.dmp

    Filesize

    256KB

  • memory/1608-110-0x0000000004D50000-0x0000000004D90000-memory.dmp

    Filesize

    256KB

  • memory/1608-109-0x0000000004D50000-0x0000000004D90000-memory.dmp

    Filesize

    256KB

  • memory/1608-108-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/1608-105-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-107-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-103-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-101-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-97-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-99-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-93-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-95-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-91-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-89-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-83-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-85-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-81-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-80-0x0000000000980000-0x0000000000992000-memory.dmp

    Filesize

    72KB

  • memory/1608-79-0x0000000000980000-0x0000000000998000-memory.dmp

    Filesize

    96KB

  • memory/1608-78-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB