Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 19:42

General

  • Target

    cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe

  • Size

    651KB

  • MD5

    b2b93313828fc1191fd8e16ade789472

  • SHA1

    4a031f85a239f022b6c5f5bcd22eccb14bec86d7

  • SHA256

    cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419

  • SHA512

    07abd362179ff42100928f878e00fc2e2a1fea8d72018001107587606b2fecc4e45b327bc5f8905d1bbfa9f0d6bd0159cce3f83fe7289d7614918a955ad3281d

  • SSDEEP

    12288:my90Oqi/LAWEtJZP+2baOjgg8gW7/o0sxY2omQcxOjeYKIXJ0uM:my5qrWEtJZP1MSe2o5njJKIXuX

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe
    "C:\Users\Admin\AppData\Local\Temp\cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe

    Filesize

    497KB

    MD5

    ab9a16bf75f698964dab7295e0a87b47

    SHA1

    71324767de6f6b7ee356bd9c87734879d9f230f3

    SHA256

    5d5473a7884020e87eb07c2f587d97599761decdf3c5566dd7c61529e203e030

    SHA512

    71c3704dd6c3ee13915a075395b6842e536a150205c2652271bbb6fc945c4c3d1f6a86c6fe470f23900e34c3b7d65e93525bc35d019d593a3e259ba8c95d1d9d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe

    Filesize

    497KB

    MD5

    ab9a16bf75f698964dab7295e0a87b47

    SHA1

    71324767de6f6b7ee356bd9c87734879d9f230f3

    SHA256

    5d5473a7884020e87eb07c2f587d97599761decdf3c5566dd7c61529e203e030

    SHA512

    71c3704dd6c3ee13915a075395b6842e536a150205c2652271bbb6fc945c4c3d1f6a86c6fe470f23900e34c3b7d65e93525bc35d019d593a3e259ba8c95d1d9d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe

    Filesize

    341KB

    MD5

    860467327539e06048e5bb5645805b96

    SHA1

    8e013c42d7ff559c94dd89487aedbfef9b0f9b5e

    SHA256

    87e91d93cdbf4b244f21c194b11ab4f3d3d70a973a78f48878d763279cfd433c

    SHA512

    8b0561ea8d884b125f1c35f83bca1615abed661ea828819d691818ead00bc67ea14ed731fe5ef0ac70a5f2c56d2205aaeaca21454cfb04b0614bb9eac707caeb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe

    Filesize

    341KB

    MD5

    860467327539e06048e5bb5645805b96

    SHA1

    8e013c42d7ff559c94dd89487aedbfef9b0f9b5e

    SHA256

    87e91d93cdbf4b244f21c194b11ab4f3d3d70a973a78f48878d763279cfd433c

    SHA512

    8b0561ea8d884b125f1c35f83bca1615abed661ea828819d691818ead00bc67ea14ed731fe5ef0ac70a5f2c56d2205aaeaca21454cfb04b0614bb9eac707caeb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe

    Filesize

    341KB

    MD5

    860467327539e06048e5bb5645805b96

    SHA1

    8e013c42d7ff559c94dd89487aedbfef9b0f9b5e

    SHA256

    87e91d93cdbf4b244f21c194b11ab4f3d3d70a973a78f48878d763279cfd433c

    SHA512

    8b0561ea8d884b125f1c35f83bca1615abed661ea828819d691818ead00bc67ea14ed731fe5ef0ac70a5f2c56d2205aaeaca21454cfb04b0614bb9eac707caeb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe

    Filesize

    497KB

    MD5

    ab9a16bf75f698964dab7295e0a87b47

    SHA1

    71324767de6f6b7ee356bd9c87734879d9f230f3

    SHA256

    5d5473a7884020e87eb07c2f587d97599761decdf3c5566dd7c61529e203e030

    SHA512

    71c3704dd6c3ee13915a075395b6842e536a150205c2652271bbb6fc945c4c3d1f6a86c6fe470f23900e34c3b7d65e93525bc35d019d593a3e259ba8c95d1d9d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe

    Filesize

    497KB

    MD5

    ab9a16bf75f698964dab7295e0a87b47

    SHA1

    71324767de6f6b7ee356bd9c87734879d9f230f3

    SHA256

    5d5473a7884020e87eb07c2f587d97599761decdf3c5566dd7c61529e203e030

    SHA512

    71c3704dd6c3ee13915a075395b6842e536a150205c2652271bbb6fc945c4c3d1f6a86c6fe470f23900e34c3b7d65e93525bc35d019d593a3e259ba8c95d1d9d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe

    Filesize

    341KB

    MD5

    860467327539e06048e5bb5645805b96

    SHA1

    8e013c42d7ff559c94dd89487aedbfef9b0f9b5e

    SHA256

    87e91d93cdbf4b244f21c194b11ab4f3d3d70a973a78f48878d763279cfd433c

    SHA512

    8b0561ea8d884b125f1c35f83bca1615abed661ea828819d691818ead00bc67ea14ed731fe5ef0ac70a5f2c56d2205aaeaca21454cfb04b0614bb9eac707caeb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe

    Filesize

    341KB

    MD5

    860467327539e06048e5bb5645805b96

    SHA1

    8e013c42d7ff559c94dd89487aedbfef9b0f9b5e

    SHA256

    87e91d93cdbf4b244f21c194b11ab4f3d3d70a973a78f48878d763279cfd433c

    SHA512

    8b0561ea8d884b125f1c35f83bca1615abed661ea828819d691818ead00bc67ea14ed731fe5ef0ac70a5f2c56d2205aaeaca21454cfb04b0614bb9eac707caeb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe

    Filesize

    341KB

    MD5

    860467327539e06048e5bb5645805b96

    SHA1

    8e013c42d7ff559c94dd89487aedbfef9b0f9b5e

    SHA256

    87e91d93cdbf4b244f21c194b11ab4f3d3d70a973a78f48878d763279cfd433c

    SHA512

    8b0561ea8d884b125f1c35f83bca1615abed661ea828819d691818ead00bc67ea14ed731fe5ef0ac70a5f2c56d2205aaeaca21454cfb04b0614bb9eac707caeb

  • memory/1780-85-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-83-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-87-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-89-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-91-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-93-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-95-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-99-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-97-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-103-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-101-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-105-0x00000000024E0000-0x0000000002520000-memory.dmp

    Filesize

    256KB

  • memory/1780-104-0x00000000024E0000-0x0000000002520000-memory.dmp

    Filesize

    256KB

  • memory/1780-81-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-79-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-77-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-76-0x00000000004C0000-0x00000000004D3000-memory.dmp

    Filesize

    76KB

  • memory/1780-75-0x00000000004C0000-0x00000000004D8000-memory.dmp

    Filesize

    96KB

  • memory/1780-74-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/1996-122-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-138-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-118-0x0000000000C00000-0x0000000000C3A000-memory.dmp

    Filesize

    232KB

  • memory/1996-119-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-116-0x0000000000380000-0x00000000003C6000-memory.dmp

    Filesize

    280KB

  • memory/1996-120-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-124-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-126-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-128-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-130-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-132-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-134-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-136-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-117-0x0000000000AD0000-0x0000000000B0C000-memory.dmp

    Filesize

    240KB

  • memory/1996-140-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-142-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-144-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-146-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-148-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-150-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-152-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-154-0x0000000000C00000-0x0000000000C35000-memory.dmp

    Filesize

    212KB

  • memory/1996-638-0x0000000004CA0000-0x0000000004CE0000-memory.dmp

    Filesize

    256KB

  • memory/1996-640-0x0000000004CA0000-0x0000000004CE0000-memory.dmp

    Filesize

    256KB

  • memory/1996-913-0x0000000004CA0000-0x0000000004CE0000-memory.dmp

    Filesize

    256KB

  • memory/1996-916-0x0000000004CA0000-0x0000000004CE0000-memory.dmp

    Filesize

    256KB

  • memory/1996-917-0x0000000004CA0000-0x0000000004CE0000-memory.dmp

    Filesize

    256KB