Analysis

  • max time kernel
    150s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 19:50

General

  • Target

    d53fdcca9c500e9f2b52ff3b2dd1321c16ae7107a44957f217be4c1ee7b5577d.exe

  • Size

    642KB

  • MD5

    75a39ff0be724e5a2733e8042c97017d

  • SHA1

    dd6a0e8e235fc2547de9dca0d34ae9a94df17c82

  • SHA256

    d53fdcca9c500e9f2b52ff3b2dd1321c16ae7107a44957f217be4c1ee7b5577d

  • SHA512

    6f573b1e515888a1c8fec3fbe0d91f53746f46adf25c08ff2feb2e8bc067d75984bc03753b715406770e60d275ef9a15857df0f3b7b0b04bab35e3385eb0dc4a

  • SSDEEP

    12288:qy90LJIJpys8hFFBhLe6qr6qjRcbSuRt0ttb1BYYxnWeabIOgXq/jVyhT:qygJ+pyLhb6lrDNcAVBlWtbRZro

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d53fdcca9c500e9f2b52ff3b2dd1321c16ae7107a44957f217be4c1ee7b5577d.exe
    "C:\Users\Admin\AppData\Local\Temp\d53fdcca9c500e9f2b52ff3b2dd1321c16ae7107a44957f217be4c1ee7b5577d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st835403.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st835403.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\45310735.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\45310735.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp473762.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp473762.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st835403.exe

    Filesize

    488KB

    MD5

    18acf8cfa20221b1f1fcc5d5a79888d3

    SHA1

    f57613505e057e5664bf460af900b167db2a18fd

    SHA256

    00e3a94bfe4cfdb2101259f40602003d96acd1c647d6f517c9478972a2e48ebd

    SHA512

    53c619b40ff2dee111d834e4f01f18ec99b23e75da82df191b8f9bb7c65ac711fcc93694dae6bd9de2dd49436afebf1522dcff732e7668ccacf1ab189f400a3e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st835403.exe

    Filesize

    488KB

    MD5

    18acf8cfa20221b1f1fcc5d5a79888d3

    SHA1

    f57613505e057e5664bf460af900b167db2a18fd

    SHA256

    00e3a94bfe4cfdb2101259f40602003d96acd1c647d6f517c9478972a2e48ebd

    SHA512

    53c619b40ff2dee111d834e4f01f18ec99b23e75da82df191b8f9bb7c65ac711fcc93694dae6bd9de2dd49436afebf1522dcff732e7668ccacf1ab189f400a3e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\45310735.exe

    Filesize

    176KB

    MD5

    2b71f4b18ac8214a2bff547b6ce2f64f

    SHA1

    b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

    SHA256

    f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

    SHA512

    33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\45310735.exe

    Filesize

    176KB

    MD5

    2b71f4b18ac8214a2bff547b6ce2f64f

    SHA1

    b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

    SHA256

    f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

    SHA512

    33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp473762.exe

    Filesize

    340KB

    MD5

    cedb6a4822b90149b99c8f189d42bd7a

    SHA1

    3e5e21e83a434039f6a181ce0b24bb012f3cf0e0

    SHA256

    bef5f6a99ba55d2ea41b92f8c4a7386b6e2c8dc41b4815a00f34ed0872d485d8

    SHA512

    8c5975d43c98d16dfc10de7953c578e309a35f7fbe8f5b1af5bd0d395efa27bb884e0bcbd2e0013c7bea498160dd86bfabc0433e949c517b9b85e33867f4c0ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp473762.exe

    Filesize

    340KB

    MD5

    cedb6a4822b90149b99c8f189d42bd7a

    SHA1

    3e5e21e83a434039f6a181ce0b24bb012f3cf0e0

    SHA256

    bef5f6a99ba55d2ea41b92f8c4a7386b6e2c8dc41b4815a00f34ed0872d485d8

    SHA512

    8c5975d43c98d16dfc10de7953c578e309a35f7fbe8f5b1af5bd0d395efa27bb884e0bcbd2e0013c7bea498160dd86bfabc0433e949c517b9b85e33867f4c0ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp473762.exe

    Filesize

    340KB

    MD5

    cedb6a4822b90149b99c8f189d42bd7a

    SHA1

    3e5e21e83a434039f6a181ce0b24bb012f3cf0e0

    SHA256

    bef5f6a99ba55d2ea41b92f8c4a7386b6e2c8dc41b4815a00f34ed0872d485d8

    SHA512

    8c5975d43c98d16dfc10de7953c578e309a35f7fbe8f5b1af5bd0d395efa27bb884e0bcbd2e0013c7bea498160dd86bfabc0433e949c517b9b85e33867f4c0ef

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st835403.exe

    Filesize

    488KB

    MD5

    18acf8cfa20221b1f1fcc5d5a79888d3

    SHA1

    f57613505e057e5664bf460af900b167db2a18fd

    SHA256

    00e3a94bfe4cfdb2101259f40602003d96acd1c647d6f517c9478972a2e48ebd

    SHA512

    53c619b40ff2dee111d834e4f01f18ec99b23e75da82df191b8f9bb7c65ac711fcc93694dae6bd9de2dd49436afebf1522dcff732e7668ccacf1ab189f400a3e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st835403.exe

    Filesize

    488KB

    MD5

    18acf8cfa20221b1f1fcc5d5a79888d3

    SHA1

    f57613505e057e5664bf460af900b167db2a18fd

    SHA256

    00e3a94bfe4cfdb2101259f40602003d96acd1c647d6f517c9478972a2e48ebd

    SHA512

    53c619b40ff2dee111d834e4f01f18ec99b23e75da82df191b8f9bb7c65ac711fcc93694dae6bd9de2dd49436afebf1522dcff732e7668ccacf1ab189f400a3e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\45310735.exe

    Filesize

    176KB

    MD5

    2b71f4b18ac8214a2bff547b6ce2f64f

    SHA1

    b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

    SHA256

    f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

    SHA512

    33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\45310735.exe

    Filesize

    176KB

    MD5

    2b71f4b18ac8214a2bff547b6ce2f64f

    SHA1

    b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

    SHA256

    f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

    SHA512

    33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp473762.exe

    Filesize

    340KB

    MD5

    cedb6a4822b90149b99c8f189d42bd7a

    SHA1

    3e5e21e83a434039f6a181ce0b24bb012f3cf0e0

    SHA256

    bef5f6a99ba55d2ea41b92f8c4a7386b6e2c8dc41b4815a00f34ed0872d485d8

    SHA512

    8c5975d43c98d16dfc10de7953c578e309a35f7fbe8f5b1af5bd0d395efa27bb884e0bcbd2e0013c7bea498160dd86bfabc0433e949c517b9b85e33867f4c0ef

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp473762.exe

    Filesize

    340KB

    MD5

    cedb6a4822b90149b99c8f189d42bd7a

    SHA1

    3e5e21e83a434039f6a181ce0b24bb012f3cf0e0

    SHA256

    bef5f6a99ba55d2ea41b92f8c4a7386b6e2c8dc41b4815a00f34ed0872d485d8

    SHA512

    8c5975d43c98d16dfc10de7953c578e309a35f7fbe8f5b1af5bd0d395efa27bb884e0bcbd2e0013c7bea498160dd86bfabc0433e949c517b9b85e33867f4c0ef

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp473762.exe

    Filesize

    340KB

    MD5

    cedb6a4822b90149b99c8f189d42bd7a

    SHA1

    3e5e21e83a434039f6a181ce0b24bb012f3cf0e0

    SHA256

    bef5f6a99ba55d2ea41b92f8c4a7386b6e2c8dc41b4815a00f34ed0872d485d8

    SHA512

    8c5975d43c98d16dfc10de7953c578e309a35f7fbe8f5b1af5bd0d395efa27bb884e0bcbd2e0013c7bea498160dd86bfabc0433e949c517b9b85e33867f4c0ef

  • memory/664-81-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-83-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-85-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-87-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-89-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-93-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-101-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-105-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-103-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-99-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-97-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-95-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-91-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-79-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-78-0x00000000006B0000-0x00000000006C3000-memory.dmp

    Filesize

    76KB

  • memory/664-77-0x00000000006B0000-0x00000000006C8000-memory.dmp

    Filesize

    96KB

  • memory/664-75-0x0000000001E30000-0x0000000001E70000-memory.dmp

    Filesize

    256KB

  • memory/664-76-0x0000000001E30000-0x0000000001E70000-memory.dmp

    Filesize

    256KB

  • memory/664-74-0x0000000000480000-0x000000000049A000-memory.dmp

    Filesize

    104KB

  • memory/1216-121-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-139-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-118-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-119-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-116-0x0000000004A30000-0x0000000004A6C000-memory.dmp

    Filesize

    240KB

  • memory/1216-123-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-125-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-127-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-129-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-131-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-133-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-135-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-137-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-117-0x0000000004BB0000-0x0000000004BEA000-memory.dmp

    Filesize

    232KB

  • memory/1216-141-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-143-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-145-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-147-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-149-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-151-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-153-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/1216-746-0x0000000002F80000-0x0000000002FC6000-memory.dmp

    Filesize

    280KB

  • memory/1216-748-0x00000000071C0000-0x0000000007200000-memory.dmp

    Filesize

    256KB

  • memory/1216-750-0x00000000071C0000-0x0000000007200000-memory.dmp

    Filesize

    256KB

  • memory/1216-914-0x00000000071C0000-0x0000000007200000-memory.dmp

    Filesize

    256KB

  • memory/1216-916-0x00000000071C0000-0x0000000007200000-memory.dmp

    Filesize

    256KB