Analysis

  • max time kernel
    158s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 20:31

General

  • Target

    f63470d591ecb9907f17f81729a864d2e5724d0fc6fa140c7dc230c573f00644.exe

  • Size

    611KB

  • MD5

    dd140c5dd79f4211320d7e6b751aa7c1

  • SHA1

    f43ecb8a93fc938f5e8d9e4fcf9f4dfd85fed9c4

  • SHA256

    f63470d591ecb9907f17f81729a864d2e5724d0fc6fa140c7dc230c573f00644

  • SHA512

    42cff07187801f2c5b7645ef9a9df479ab38f0a3eccb8c4ae28423c58a833207c8754043cd4375cc698a4a57f7679f45c8e93e7dae490efb62991d426a62249d

  • SSDEEP

    12288:My907bAO94Pmm5+WiAzk9XfS9NhCrVFmnZgW:Myg9o99k9XfjmnZgW

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f63470d591ecb9907f17f81729a864d2e5724d0fc6fa140c7dc230c573f00644.exe
    "C:\Users\Admin\AppData\Local\Temp\f63470d591ecb9907f17f81729a864d2e5724d0fc6fa140c7dc230c573f00644.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st558793.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st558793.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02832056.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02832056.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp207392.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp207392.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st558793.exe

    Filesize

    457KB

    MD5

    402254ded16ec3ed15f79919f59b87b9

    SHA1

    a2c94261239417fe113564f82fedc44149065c26

    SHA256

    0774d914bf04f2281f6193b0e565bb04b502a8460f8525e9af5adf51569c7b77

    SHA512

    ed7daba7a4df2d863fa001681f7659ab7aecdf65f0032a19f9d3c3c0ab2e462d37b807ad0711b0b6162fcb8e1ce5e780dfaee69e717f93f40f66c8837bedae28

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st558793.exe

    Filesize

    457KB

    MD5

    402254ded16ec3ed15f79919f59b87b9

    SHA1

    a2c94261239417fe113564f82fedc44149065c26

    SHA256

    0774d914bf04f2281f6193b0e565bb04b502a8460f8525e9af5adf51569c7b77

    SHA512

    ed7daba7a4df2d863fa001681f7659ab7aecdf65f0032a19f9d3c3c0ab2e462d37b807ad0711b0b6162fcb8e1ce5e780dfaee69e717f93f40f66c8837bedae28

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02832056.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02832056.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp207392.exe

    Filesize

    459KB

    MD5

    35630ba2f555109b43c74c990e933c30

    SHA1

    ea19c5b7568dac2620c0db0c855e08f0526c00ee

    SHA256

    1b69b0eb9793860b02c6f8274c8e9aa40678c16c99357a463a2ab3c7120124fa

    SHA512

    f4681208e98a9a1a4cc985454fea02b694c826b3ab15e7af64df26b990d3822f117a5be5b4674c5ba63f161b2fbda7de71cece752b24139bbc96df9e9e23f164

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp207392.exe

    Filesize

    459KB

    MD5

    35630ba2f555109b43c74c990e933c30

    SHA1

    ea19c5b7568dac2620c0db0c855e08f0526c00ee

    SHA256

    1b69b0eb9793860b02c6f8274c8e9aa40678c16c99357a463a2ab3c7120124fa

    SHA512

    f4681208e98a9a1a4cc985454fea02b694c826b3ab15e7af64df26b990d3822f117a5be5b4674c5ba63f161b2fbda7de71cece752b24139bbc96df9e9e23f164

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp207392.exe

    Filesize

    459KB

    MD5

    35630ba2f555109b43c74c990e933c30

    SHA1

    ea19c5b7568dac2620c0db0c855e08f0526c00ee

    SHA256

    1b69b0eb9793860b02c6f8274c8e9aa40678c16c99357a463a2ab3c7120124fa

    SHA512

    f4681208e98a9a1a4cc985454fea02b694c826b3ab15e7af64df26b990d3822f117a5be5b4674c5ba63f161b2fbda7de71cece752b24139bbc96df9e9e23f164

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st558793.exe

    Filesize

    457KB

    MD5

    402254ded16ec3ed15f79919f59b87b9

    SHA1

    a2c94261239417fe113564f82fedc44149065c26

    SHA256

    0774d914bf04f2281f6193b0e565bb04b502a8460f8525e9af5adf51569c7b77

    SHA512

    ed7daba7a4df2d863fa001681f7659ab7aecdf65f0032a19f9d3c3c0ab2e462d37b807ad0711b0b6162fcb8e1ce5e780dfaee69e717f93f40f66c8837bedae28

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st558793.exe

    Filesize

    457KB

    MD5

    402254ded16ec3ed15f79919f59b87b9

    SHA1

    a2c94261239417fe113564f82fedc44149065c26

    SHA256

    0774d914bf04f2281f6193b0e565bb04b502a8460f8525e9af5adf51569c7b77

    SHA512

    ed7daba7a4df2d863fa001681f7659ab7aecdf65f0032a19f9d3c3c0ab2e462d37b807ad0711b0b6162fcb8e1ce5e780dfaee69e717f93f40f66c8837bedae28

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\02832056.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp207392.exe

    Filesize

    459KB

    MD5

    35630ba2f555109b43c74c990e933c30

    SHA1

    ea19c5b7568dac2620c0db0c855e08f0526c00ee

    SHA256

    1b69b0eb9793860b02c6f8274c8e9aa40678c16c99357a463a2ab3c7120124fa

    SHA512

    f4681208e98a9a1a4cc985454fea02b694c826b3ab15e7af64df26b990d3822f117a5be5b4674c5ba63f161b2fbda7de71cece752b24139bbc96df9e9e23f164

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp207392.exe

    Filesize

    459KB

    MD5

    35630ba2f555109b43c74c990e933c30

    SHA1

    ea19c5b7568dac2620c0db0c855e08f0526c00ee

    SHA256

    1b69b0eb9793860b02c6f8274c8e9aa40678c16c99357a463a2ab3c7120124fa

    SHA512

    f4681208e98a9a1a4cc985454fea02b694c826b3ab15e7af64df26b990d3822f117a5be5b4674c5ba63f161b2fbda7de71cece752b24139bbc96df9e9e23f164

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp207392.exe

    Filesize

    459KB

    MD5

    35630ba2f555109b43c74c990e933c30

    SHA1

    ea19c5b7568dac2620c0db0c855e08f0526c00ee

    SHA256

    1b69b0eb9793860b02c6f8274c8e9aa40678c16c99357a463a2ab3c7120124fa

    SHA512

    f4681208e98a9a1a4cc985454fea02b694c826b3ab15e7af64df26b990d3822f117a5be5b4674c5ba63f161b2fbda7de71cece752b24139bbc96df9e9e23f164

  • memory/588-106-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-122-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-85-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-88-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-86-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-90-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-92-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-94-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-96-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-98-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-100-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-102-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-104-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-83-0x0000000000EB0000-0x0000000000EEC000-memory.dmp

    Filesize

    240KB

  • memory/588-108-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-110-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-112-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-114-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-116-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-118-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-120-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-84-0x0000000000F40000-0x0000000000F7A000-memory.dmp

    Filesize

    232KB

  • memory/588-124-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-126-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-128-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-131-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/588-133-0x0000000005140000-0x0000000005180000-memory.dmp

    Filesize

    256KB

  • memory/588-135-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-134-0x0000000005140000-0x0000000005180000-memory.dmp

    Filesize

    256KB

  • memory/588-130-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-137-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-139-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-141-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-143-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-145-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-147-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-149-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-151-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/588-880-0x0000000005140000-0x0000000005180000-memory.dmp

    Filesize

    256KB

  • memory/588-883-0x0000000005140000-0x0000000005180000-memory.dmp

    Filesize

    256KB

  • memory/1172-72-0x0000000000F10000-0x0000000000F1A000-memory.dmp

    Filesize

    40KB