Analysis

  • max time kernel
    145s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 20:09

General

  • Target

    e294240fa6434a0cdb84f054d6f3aacb8bbdd321bf3848ab1cec6888682bd38e.exe

  • Size

    746KB

  • MD5

    49b87574e7fcd6507d0ea3a35fad6e7a

  • SHA1

    93dea5b563c7860f073f9c8cd0b6d8474381b8b4

  • SHA256

    e294240fa6434a0cdb84f054d6f3aacb8bbdd321bf3848ab1cec6888682bd38e

  • SHA512

    b3cb59eb2f41295c6d9eefdbe3ab9570e52aeec3c7de07dfaaebad9093ae7eafcfefe172c052be03ec06f128f7dbf0508d6d0ded45138e9b0f16aa775ae43a52

  • SSDEEP

    12288:Wy90Vbiezt96fwczrWu6hJCPbiajDfrQBdVIviy/97ZBtyXCvUTLVqTWe1bo8:WySbiS9G7L6hJ0iaPAduvJhyXO/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e294240fa6434a0cdb84f054d6f3aacb8bbdd321bf3848ab1cec6888682bd38e.exe
    "C:\Users\Admin\AppData\Local\Temp\e294240fa6434a0cdb84f054d6f3aacb8bbdd321bf3848ab1cec6888682bd38e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un931191.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un931191.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09447098.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09447098.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk640501.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk640501.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un931191.exe

    Filesize

    592KB

    MD5

    63c9f017c876306c8ff61995498e882c

    SHA1

    2001ba403fde1f89f2793d2fda6c580978373bfb

    SHA256

    5a9f88e29d7071a55bd882b6ebd9f33f5765bee5b3d31cdbf7357cf6776d4544

    SHA512

    b17942f30d500cd76a90903af739db33bfcbd222be1f47b3cdcd244e46bc64007ac3c8d1cf96b62e6bca54dcf323fcd6cc9e8aed9b493d41d5406491fce73433

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un931191.exe

    Filesize

    592KB

    MD5

    63c9f017c876306c8ff61995498e882c

    SHA1

    2001ba403fde1f89f2793d2fda6c580978373bfb

    SHA256

    5a9f88e29d7071a55bd882b6ebd9f33f5765bee5b3d31cdbf7357cf6776d4544

    SHA512

    b17942f30d500cd76a90903af739db33bfcbd222be1f47b3cdcd244e46bc64007ac3c8d1cf96b62e6bca54dcf323fcd6cc9e8aed9b493d41d5406491fce73433

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09447098.exe

    Filesize

    376KB

    MD5

    2d5c72f1c5cda174e052fab8e306541f

    SHA1

    f6de9603a95a37f39128827e8f39f1fe591df31a

    SHA256

    2b751ab7658f4343e5cf33c85e90a5482729b410e7eccf71daeb24d427fa47ce

    SHA512

    f56706a76486cc31a326b7733486f7e9fcdd59c8840fb4fc87a0f33ce2e540b9133cf912fea5eb92965462d5a83a71d27a3bff1729baf65dbd7da3c0312b2e4f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09447098.exe

    Filesize

    376KB

    MD5

    2d5c72f1c5cda174e052fab8e306541f

    SHA1

    f6de9603a95a37f39128827e8f39f1fe591df31a

    SHA256

    2b751ab7658f4343e5cf33c85e90a5482729b410e7eccf71daeb24d427fa47ce

    SHA512

    f56706a76486cc31a326b7733486f7e9fcdd59c8840fb4fc87a0f33ce2e540b9133cf912fea5eb92965462d5a83a71d27a3bff1729baf65dbd7da3c0312b2e4f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09447098.exe

    Filesize

    376KB

    MD5

    2d5c72f1c5cda174e052fab8e306541f

    SHA1

    f6de9603a95a37f39128827e8f39f1fe591df31a

    SHA256

    2b751ab7658f4343e5cf33c85e90a5482729b410e7eccf71daeb24d427fa47ce

    SHA512

    f56706a76486cc31a326b7733486f7e9fcdd59c8840fb4fc87a0f33ce2e540b9133cf912fea5eb92965462d5a83a71d27a3bff1729baf65dbd7da3c0312b2e4f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk640501.exe

    Filesize

    459KB

    MD5

    5791dc2e7400312eedb34b24376e0047

    SHA1

    08870ac8193403fc5a8c95d01ac292dea1733ea0

    SHA256

    11d36f6908c7c8ee43407793c36e41f6e33421f9dbb59158c9aca372a85fca8b

    SHA512

    f1eb32ed068c4158746fb562250ebd505fc74cf397381c75f4650d1c5f6f62adba9f8385761c65cedbebdc7c8c6f58bb0f0c86abfdf34d6a3d7ecab7141fdead

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk640501.exe

    Filesize

    459KB

    MD5

    5791dc2e7400312eedb34b24376e0047

    SHA1

    08870ac8193403fc5a8c95d01ac292dea1733ea0

    SHA256

    11d36f6908c7c8ee43407793c36e41f6e33421f9dbb59158c9aca372a85fca8b

    SHA512

    f1eb32ed068c4158746fb562250ebd505fc74cf397381c75f4650d1c5f6f62adba9f8385761c65cedbebdc7c8c6f58bb0f0c86abfdf34d6a3d7ecab7141fdead

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk640501.exe

    Filesize

    459KB

    MD5

    5791dc2e7400312eedb34b24376e0047

    SHA1

    08870ac8193403fc5a8c95d01ac292dea1733ea0

    SHA256

    11d36f6908c7c8ee43407793c36e41f6e33421f9dbb59158c9aca372a85fca8b

    SHA512

    f1eb32ed068c4158746fb562250ebd505fc74cf397381c75f4650d1c5f6f62adba9f8385761c65cedbebdc7c8c6f58bb0f0c86abfdf34d6a3d7ecab7141fdead

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un931191.exe

    Filesize

    592KB

    MD5

    63c9f017c876306c8ff61995498e882c

    SHA1

    2001ba403fde1f89f2793d2fda6c580978373bfb

    SHA256

    5a9f88e29d7071a55bd882b6ebd9f33f5765bee5b3d31cdbf7357cf6776d4544

    SHA512

    b17942f30d500cd76a90903af739db33bfcbd222be1f47b3cdcd244e46bc64007ac3c8d1cf96b62e6bca54dcf323fcd6cc9e8aed9b493d41d5406491fce73433

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un931191.exe

    Filesize

    592KB

    MD5

    63c9f017c876306c8ff61995498e882c

    SHA1

    2001ba403fde1f89f2793d2fda6c580978373bfb

    SHA256

    5a9f88e29d7071a55bd882b6ebd9f33f5765bee5b3d31cdbf7357cf6776d4544

    SHA512

    b17942f30d500cd76a90903af739db33bfcbd222be1f47b3cdcd244e46bc64007ac3c8d1cf96b62e6bca54dcf323fcd6cc9e8aed9b493d41d5406491fce73433

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\09447098.exe

    Filesize

    376KB

    MD5

    2d5c72f1c5cda174e052fab8e306541f

    SHA1

    f6de9603a95a37f39128827e8f39f1fe591df31a

    SHA256

    2b751ab7658f4343e5cf33c85e90a5482729b410e7eccf71daeb24d427fa47ce

    SHA512

    f56706a76486cc31a326b7733486f7e9fcdd59c8840fb4fc87a0f33ce2e540b9133cf912fea5eb92965462d5a83a71d27a3bff1729baf65dbd7da3c0312b2e4f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\09447098.exe

    Filesize

    376KB

    MD5

    2d5c72f1c5cda174e052fab8e306541f

    SHA1

    f6de9603a95a37f39128827e8f39f1fe591df31a

    SHA256

    2b751ab7658f4343e5cf33c85e90a5482729b410e7eccf71daeb24d427fa47ce

    SHA512

    f56706a76486cc31a326b7733486f7e9fcdd59c8840fb4fc87a0f33ce2e540b9133cf912fea5eb92965462d5a83a71d27a3bff1729baf65dbd7da3c0312b2e4f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\09447098.exe

    Filesize

    376KB

    MD5

    2d5c72f1c5cda174e052fab8e306541f

    SHA1

    f6de9603a95a37f39128827e8f39f1fe591df31a

    SHA256

    2b751ab7658f4343e5cf33c85e90a5482729b410e7eccf71daeb24d427fa47ce

    SHA512

    f56706a76486cc31a326b7733486f7e9fcdd59c8840fb4fc87a0f33ce2e540b9133cf912fea5eb92965462d5a83a71d27a3bff1729baf65dbd7da3c0312b2e4f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk640501.exe

    Filesize

    459KB

    MD5

    5791dc2e7400312eedb34b24376e0047

    SHA1

    08870ac8193403fc5a8c95d01ac292dea1733ea0

    SHA256

    11d36f6908c7c8ee43407793c36e41f6e33421f9dbb59158c9aca372a85fca8b

    SHA512

    f1eb32ed068c4158746fb562250ebd505fc74cf397381c75f4650d1c5f6f62adba9f8385761c65cedbebdc7c8c6f58bb0f0c86abfdf34d6a3d7ecab7141fdead

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk640501.exe

    Filesize

    459KB

    MD5

    5791dc2e7400312eedb34b24376e0047

    SHA1

    08870ac8193403fc5a8c95d01ac292dea1733ea0

    SHA256

    11d36f6908c7c8ee43407793c36e41f6e33421f9dbb59158c9aca372a85fca8b

    SHA512

    f1eb32ed068c4158746fb562250ebd505fc74cf397381c75f4650d1c5f6f62adba9f8385761c65cedbebdc7c8c6f58bb0f0c86abfdf34d6a3d7ecab7141fdead

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk640501.exe

    Filesize

    459KB

    MD5

    5791dc2e7400312eedb34b24376e0047

    SHA1

    08870ac8193403fc5a8c95d01ac292dea1733ea0

    SHA256

    11d36f6908c7c8ee43407793c36e41f6e33421f9dbb59158c9aca372a85fca8b

    SHA512

    f1eb32ed068c4158746fb562250ebd505fc74cf397381c75f4650d1c5f6f62adba9f8385761c65cedbebdc7c8c6f58bb0f0c86abfdf34d6a3d7ecab7141fdead

  • memory/1296-151-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-133-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-126-0x0000000002680000-0x00000000026BC000-memory.dmp

    Filesize

    240KB

  • memory/1296-149-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-147-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-145-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-143-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-141-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-139-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-137-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-135-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-153-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-131-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-130-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-128-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/1296-129-0x00000000028A0000-0x00000000028E0000-memory.dmp

    Filesize

    256KB

  • memory/1296-127-0x0000000002830000-0x000000000286A000-memory.dmp

    Filesize

    232KB

  • memory/1296-155-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-157-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-159-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-161-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/1296-922-0x00000000028A0000-0x00000000028E0000-memory.dmp

    Filesize

    256KB

  • memory/1296-925-0x00000000028A0000-0x00000000028E0000-memory.dmp

    Filesize

    256KB

  • memory/1856-84-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-115-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1856-112-0x0000000004F30000-0x0000000004F70000-memory.dmp

    Filesize

    256KB

  • memory/1856-111-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1856-109-0x0000000004F30000-0x0000000004F70000-memory.dmp

    Filesize

    256KB

  • memory/1856-110-0x0000000004F30000-0x0000000004F70000-memory.dmp

    Filesize

    256KB

  • memory/1856-88-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-90-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-92-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-94-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-96-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-100-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-102-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-104-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-106-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-108-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-98-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-86-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-82-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-81-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/1856-80-0x0000000000900000-0x0000000000918000-memory.dmp

    Filesize

    96KB

  • memory/1856-79-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/1856-78-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB