Analysis

  • max time kernel
    150s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 19:40

General

  • Target

    cd0199552de702060ddcda663a751021488f8a9cce2be4406aacf1fc3b5ebb4b.exe

  • Size

    884KB

  • MD5

    f7fc6bd9feb69be6a644430c64bd90a7

  • SHA1

    809d48c2b4ea9ca9477846ceb6ba646fe2aea9a3

  • SHA256

    cd0199552de702060ddcda663a751021488f8a9cce2be4406aacf1fc3b5ebb4b

  • SHA512

    9a43bacfb18887cbd08c908d128ce83e5835f0dd093c0164a780e5dd5b2823778a59f2dd8fcefe290e48864465c1c7d1bfefca83ecb02933f5dd6d2cf42f685e

  • SSDEEP

    12288:Xy90LqXXpxh3u3oOdZtCH+IyYBNrmfoeCr2rIoNegto+qfYEV/tGzed8l8z/8ZSz:XykkmnWgMZmfoKH8fd1Ued8Kkc8c

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd0199552de702060ddcda663a751021488f8a9cce2be4406aacf1fc3b5ebb4b.exe
    "C:\Users\Admin\AppData\Local\Temp\cd0199552de702060ddcda663a751021488f8a9cce2be4406aacf1fc3b5ebb4b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za182461.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za182461.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za055911.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za055911.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:304
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\09819040.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\09819040.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:768
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w55PQ52.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w55PQ52.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1884

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za182461.exe

          Filesize

          722KB

          MD5

          b94765e00b2ca5118cf5867fd0f75cb0

          SHA1

          28ea90ff3cf6a0a42fb0b90aa10f079b1bf2f166

          SHA256

          a6a86e4d22f67021e80be1c5f88169eaa6b520a42b630fb779f0a4dfe719c692

          SHA512

          d35bc99b582f046327fce9be71e1b29132542213f0351a1229c674495b9639773c60770b0a566bb7ba25fbfb192c1eeeb8344a705aeabe17b3305434e1ffba1e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za182461.exe

          Filesize

          722KB

          MD5

          b94765e00b2ca5118cf5867fd0f75cb0

          SHA1

          28ea90ff3cf6a0a42fb0b90aa10f079b1bf2f166

          SHA256

          a6a86e4d22f67021e80be1c5f88169eaa6b520a42b630fb779f0a4dfe719c692

          SHA512

          d35bc99b582f046327fce9be71e1b29132542213f0351a1229c674495b9639773c60770b0a566bb7ba25fbfb192c1eeeb8344a705aeabe17b3305434e1ffba1e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za055911.exe

          Filesize

          540KB

          MD5

          6a918a14bfb414e0a0dc5958d70b450b

          SHA1

          008e95cfcb103e6eba8210043d546746deada3ac

          SHA256

          ab29bf0c3c3a67a9ad48fbd8811ad1f71c34c837308e82fb3c7aa65f85f4da3a

          SHA512

          98ae5ace8b32fc3caad45ff4863f42757dad6dab9cd349344b2785a1d7624723b6196191949c9db86e5df90040beb1e6e82eaf720e2811685caeb3a2b6c40947

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za055911.exe

          Filesize

          540KB

          MD5

          6a918a14bfb414e0a0dc5958d70b450b

          SHA1

          008e95cfcb103e6eba8210043d546746deada3ac

          SHA256

          ab29bf0c3c3a67a9ad48fbd8811ad1f71c34c837308e82fb3c7aa65f85f4da3a

          SHA512

          98ae5ace8b32fc3caad45ff4863f42757dad6dab9cd349344b2785a1d7624723b6196191949c9db86e5df90040beb1e6e82eaf720e2811685caeb3a2b6c40947

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\09819040.exe

          Filesize

          258KB

          MD5

          223738e6926f3071ddc70a6e9de62235

          SHA1

          241c7b240d450cb8ad160cb05d1f894032188a72

          SHA256

          b587662a1bf22ea26623d54425c4d0427f87e6f34d286405b1b6e370a9c3abb7

          SHA512

          5319d61cc255438d8080739938427142b81366b0723b64f5109795d837c3d9becd82b647274bc67d4bbc6067a213ed0ef12a89baea547fb7f0296129e35cb65f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\09819040.exe

          Filesize

          258KB

          MD5

          223738e6926f3071ddc70a6e9de62235

          SHA1

          241c7b240d450cb8ad160cb05d1f894032188a72

          SHA256

          b587662a1bf22ea26623d54425c4d0427f87e6f34d286405b1b6e370a9c3abb7

          SHA512

          5319d61cc255438d8080739938427142b81366b0723b64f5109795d837c3d9becd82b647274bc67d4bbc6067a213ed0ef12a89baea547fb7f0296129e35cb65f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\09819040.exe

          Filesize

          258KB

          MD5

          223738e6926f3071ddc70a6e9de62235

          SHA1

          241c7b240d450cb8ad160cb05d1f894032188a72

          SHA256

          b587662a1bf22ea26623d54425c4d0427f87e6f34d286405b1b6e370a9c3abb7

          SHA512

          5319d61cc255438d8080739938427142b81366b0723b64f5109795d837c3d9becd82b647274bc67d4bbc6067a213ed0ef12a89baea547fb7f0296129e35cb65f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w55PQ52.exe

          Filesize

          340KB

          MD5

          4c7f70e1e97c89f32190437eb4a1809e

          SHA1

          22554e70530ce3de55fe405de0781659e28a45a7

          SHA256

          99af1e91dbb79c269ec006f78bafb1ac9ac6405771fc840545488ec25d708fd1

          SHA512

          629b6cd327df2c7ae87eb2396a91a3b945de9f8cd5c26baf1c5e3b5f227349d8904a0beef58b89399b8d65f0fda5271127d1c58dc0815121ef7c318be44ffb3e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w55PQ52.exe

          Filesize

          340KB

          MD5

          4c7f70e1e97c89f32190437eb4a1809e

          SHA1

          22554e70530ce3de55fe405de0781659e28a45a7

          SHA256

          99af1e91dbb79c269ec006f78bafb1ac9ac6405771fc840545488ec25d708fd1

          SHA512

          629b6cd327df2c7ae87eb2396a91a3b945de9f8cd5c26baf1c5e3b5f227349d8904a0beef58b89399b8d65f0fda5271127d1c58dc0815121ef7c318be44ffb3e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w55PQ52.exe

          Filesize

          340KB

          MD5

          4c7f70e1e97c89f32190437eb4a1809e

          SHA1

          22554e70530ce3de55fe405de0781659e28a45a7

          SHA256

          99af1e91dbb79c269ec006f78bafb1ac9ac6405771fc840545488ec25d708fd1

          SHA512

          629b6cd327df2c7ae87eb2396a91a3b945de9f8cd5c26baf1c5e3b5f227349d8904a0beef58b89399b8d65f0fda5271127d1c58dc0815121ef7c318be44ffb3e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\za182461.exe

          Filesize

          722KB

          MD5

          b94765e00b2ca5118cf5867fd0f75cb0

          SHA1

          28ea90ff3cf6a0a42fb0b90aa10f079b1bf2f166

          SHA256

          a6a86e4d22f67021e80be1c5f88169eaa6b520a42b630fb779f0a4dfe719c692

          SHA512

          d35bc99b582f046327fce9be71e1b29132542213f0351a1229c674495b9639773c60770b0a566bb7ba25fbfb192c1eeeb8344a705aeabe17b3305434e1ffba1e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\za182461.exe

          Filesize

          722KB

          MD5

          b94765e00b2ca5118cf5867fd0f75cb0

          SHA1

          28ea90ff3cf6a0a42fb0b90aa10f079b1bf2f166

          SHA256

          a6a86e4d22f67021e80be1c5f88169eaa6b520a42b630fb779f0a4dfe719c692

          SHA512

          d35bc99b582f046327fce9be71e1b29132542213f0351a1229c674495b9639773c60770b0a566bb7ba25fbfb192c1eeeb8344a705aeabe17b3305434e1ffba1e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\za055911.exe

          Filesize

          540KB

          MD5

          6a918a14bfb414e0a0dc5958d70b450b

          SHA1

          008e95cfcb103e6eba8210043d546746deada3ac

          SHA256

          ab29bf0c3c3a67a9ad48fbd8811ad1f71c34c837308e82fb3c7aa65f85f4da3a

          SHA512

          98ae5ace8b32fc3caad45ff4863f42757dad6dab9cd349344b2785a1d7624723b6196191949c9db86e5df90040beb1e6e82eaf720e2811685caeb3a2b6c40947

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\za055911.exe

          Filesize

          540KB

          MD5

          6a918a14bfb414e0a0dc5958d70b450b

          SHA1

          008e95cfcb103e6eba8210043d546746deada3ac

          SHA256

          ab29bf0c3c3a67a9ad48fbd8811ad1f71c34c837308e82fb3c7aa65f85f4da3a

          SHA512

          98ae5ace8b32fc3caad45ff4863f42757dad6dab9cd349344b2785a1d7624723b6196191949c9db86e5df90040beb1e6e82eaf720e2811685caeb3a2b6c40947

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\09819040.exe

          Filesize

          258KB

          MD5

          223738e6926f3071ddc70a6e9de62235

          SHA1

          241c7b240d450cb8ad160cb05d1f894032188a72

          SHA256

          b587662a1bf22ea26623d54425c4d0427f87e6f34d286405b1b6e370a9c3abb7

          SHA512

          5319d61cc255438d8080739938427142b81366b0723b64f5109795d837c3d9becd82b647274bc67d4bbc6067a213ed0ef12a89baea547fb7f0296129e35cb65f

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\09819040.exe

          Filesize

          258KB

          MD5

          223738e6926f3071ddc70a6e9de62235

          SHA1

          241c7b240d450cb8ad160cb05d1f894032188a72

          SHA256

          b587662a1bf22ea26623d54425c4d0427f87e6f34d286405b1b6e370a9c3abb7

          SHA512

          5319d61cc255438d8080739938427142b81366b0723b64f5109795d837c3d9becd82b647274bc67d4bbc6067a213ed0ef12a89baea547fb7f0296129e35cb65f

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\09819040.exe

          Filesize

          258KB

          MD5

          223738e6926f3071ddc70a6e9de62235

          SHA1

          241c7b240d450cb8ad160cb05d1f894032188a72

          SHA256

          b587662a1bf22ea26623d54425c4d0427f87e6f34d286405b1b6e370a9c3abb7

          SHA512

          5319d61cc255438d8080739938427142b81366b0723b64f5109795d837c3d9becd82b647274bc67d4bbc6067a213ed0ef12a89baea547fb7f0296129e35cb65f

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\w55PQ52.exe

          Filesize

          340KB

          MD5

          4c7f70e1e97c89f32190437eb4a1809e

          SHA1

          22554e70530ce3de55fe405de0781659e28a45a7

          SHA256

          99af1e91dbb79c269ec006f78bafb1ac9ac6405771fc840545488ec25d708fd1

          SHA512

          629b6cd327df2c7ae87eb2396a91a3b945de9f8cd5c26baf1c5e3b5f227349d8904a0beef58b89399b8d65f0fda5271127d1c58dc0815121ef7c318be44ffb3e

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\w55PQ52.exe

          Filesize

          340KB

          MD5

          4c7f70e1e97c89f32190437eb4a1809e

          SHA1

          22554e70530ce3de55fe405de0781659e28a45a7

          SHA256

          99af1e91dbb79c269ec006f78bafb1ac9ac6405771fc840545488ec25d708fd1

          SHA512

          629b6cd327df2c7ae87eb2396a91a3b945de9f8cd5c26baf1c5e3b5f227349d8904a0beef58b89399b8d65f0fda5271127d1c58dc0815121ef7c318be44ffb3e

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\w55PQ52.exe

          Filesize

          340KB

          MD5

          4c7f70e1e97c89f32190437eb4a1809e

          SHA1

          22554e70530ce3de55fe405de0781659e28a45a7

          SHA256

          99af1e91dbb79c269ec006f78bafb1ac9ac6405771fc840545488ec25d708fd1

          SHA512

          629b6cd327df2c7ae87eb2396a91a3b945de9f8cd5c26baf1c5e3b5f227349d8904a0beef58b89399b8d65f0fda5271127d1c58dc0815121ef7c318be44ffb3e

        • memory/768-120-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-99-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-100-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-102-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-104-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-108-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-106-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-110-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-112-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-114-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-116-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-118-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-98-0x0000000003090000-0x00000000030A8000-memory.dmp

          Filesize

          96KB

        • memory/768-122-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-124-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-126-0x0000000003090000-0x00000000030A3000-memory.dmp

          Filesize

          76KB

        • memory/768-128-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/768-96-0x00000000070A0000-0x00000000070E0000-memory.dmp

          Filesize

          256KB

        • memory/768-94-0x00000000070A0000-0x00000000070E0000-memory.dmp

          Filesize

          256KB

        • memory/768-93-0x00000000070A0000-0x00000000070E0000-memory.dmp

          Filesize

          256KB

        • memory/768-92-0x0000000002BF0000-0x0000000002C0A000-memory.dmp

          Filesize

          104KB

        • memory/768-89-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/768-88-0x00000000002D0000-0x00000000002FD000-memory.dmp

          Filesize

          180KB

        • memory/1884-139-0x0000000003260000-0x000000000329C000-memory.dmp

          Filesize

          240KB

        • memory/1884-140-0x00000000032B0000-0x00000000032EA000-memory.dmp

          Filesize

          232KB

        • memory/1884-142-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-146-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-150-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-152-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-156-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-158-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-162-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-166-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-168-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-164-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-160-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-154-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-148-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-144-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-141-0x00000000032B0000-0x00000000032E5000-memory.dmp

          Filesize

          212KB

        • memory/1884-268-0x0000000000250000-0x0000000000296000-memory.dmp

          Filesize

          280KB

        • memory/1884-269-0x00000000051B0000-0x00000000051F0000-memory.dmp

          Filesize

          256KB

        • memory/1884-271-0x00000000051B0000-0x00000000051F0000-memory.dmp

          Filesize

          256KB

        • memory/1884-936-0x00000000051B0000-0x00000000051F0000-memory.dmp

          Filesize

          256KB

        • memory/1884-939-0x00000000051B0000-0x00000000051F0000-memory.dmp

          Filesize

          256KB