Analysis

  • max time kernel
    150s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:32

General

  • Target

    f6b15c33af9ed902fbda57cfe9f57a6dc3516cf90ec0581eefb4cc9c5f4cc6f7.exe

  • Size

    690KB

  • MD5

    84db0a067390a799b0a47ccbead36b2f

  • SHA1

    d00f081af580a93e3436b38db40ce2e441c935cc

  • SHA256

    f6b15c33af9ed902fbda57cfe9f57a6dc3516cf90ec0581eefb4cc9c5f4cc6f7

  • SHA512

    1b81f85f3d0b358bd6a3e5bcecb37fe1a92e2f05a7548f0ecfbc63c6487c34def827e9d92345f787d1aa0653aa4df46d38445adfccec08b06a10bfaf28633dd4

  • SSDEEP

    12288:Dy90irfgA3nj864PDVxnQkLVUFx9DC70O+I2sm/wJwsYSX0UP:DyvrfgA347P8a6x54T2sWwp

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6b15c33af9ed902fbda57cfe9f57a6dc3516cf90ec0581eefb4cc9c5f4cc6f7.exe
    "C:\Users\Admin\AppData\Local\Temp\f6b15c33af9ed902fbda57cfe9f57a6dc3516cf90ec0581eefb4cc9c5f4cc6f7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201720.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201720.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79166204.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79166204.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk938454.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk938454.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1688

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201720.exe

          Filesize

          536KB

          MD5

          70ec3e610da158315b11779abd013ca4

          SHA1

          a661889f3babcd1fe804615a80de8405beab2f37

          SHA256

          44c059f9f9235906e407b0384e3077ab85e8ca7291bda337308892bd835eacec

          SHA512

          7c10ec1cd388be35d5edd398b0cfcfaa64f416e2817c76377a255a51b422ceed4b79ab7d9c611a2ea29cb63d26f39cd07d1466645d1e00ac8d1227e862aa39f4

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201720.exe

          Filesize

          536KB

          MD5

          70ec3e610da158315b11779abd013ca4

          SHA1

          a661889f3babcd1fe804615a80de8405beab2f37

          SHA256

          44c059f9f9235906e407b0384e3077ab85e8ca7291bda337308892bd835eacec

          SHA512

          7c10ec1cd388be35d5edd398b0cfcfaa64f416e2817c76377a255a51b422ceed4b79ab7d9c611a2ea29cb63d26f39cd07d1466645d1e00ac8d1227e862aa39f4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79166204.exe

          Filesize

          259KB

          MD5

          fff151af9d83766ca0617e06d6ae0c1f

          SHA1

          3c4ce51db112e2f6978d58f6c40e7b2e88ce62c2

          SHA256

          9124f991b665f567a037338576a3e29d9db2d41d779e0c1aa9efb8bca859101b

          SHA512

          197355b3250d17adea2470211685b2f1db251998e0c09a52fd2d2a8474acfab861c642689db426f8e6bc4351b0d67f83845073d6fa8872ea46dccdd21b7395e6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79166204.exe

          Filesize

          259KB

          MD5

          fff151af9d83766ca0617e06d6ae0c1f

          SHA1

          3c4ce51db112e2f6978d58f6c40e7b2e88ce62c2

          SHA256

          9124f991b665f567a037338576a3e29d9db2d41d779e0c1aa9efb8bca859101b

          SHA512

          197355b3250d17adea2470211685b2f1db251998e0c09a52fd2d2a8474acfab861c642689db426f8e6bc4351b0d67f83845073d6fa8872ea46dccdd21b7395e6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79166204.exe

          Filesize

          259KB

          MD5

          fff151af9d83766ca0617e06d6ae0c1f

          SHA1

          3c4ce51db112e2f6978d58f6c40e7b2e88ce62c2

          SHA256

          9124f991b665f567a037338576a3e29d9db2d41d779e0c1aa9efb8bca859101b

          SHA512

          197355b3250d17adea2470211685b2f1db251998e0c09a52fd2d2a8474acfab861c642689db426f8e6bc4351b0d67f83845073d6fa8872ea46dccdd21b7395e6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk938454.exe

          Filesize

          341KB

          MD5

          2834f9848a5c947b55e0f81ba0ac970d

          SHA1

          b0760e0d481cc7d11f8c99855e181bb271ec62aa

          SHA256

          82afeeb2877d32a8f3f3edaf8bcfc4d53fd0c136df4c00ad71314d27171844ca

          SHA512

          9e7167d8c66f31142844046f4e57bf952bfb22e2cacdefe4288919e5c7d38cdcc8d724f2cc162804fc6812ebfa1933ddc8ec55b84d6c00b822ceee98856fa104

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk938454.exe

          Filesize

          341KB

          MD5

          2834f9848a5c947b55e0f81ba0ac970d

          SHA1

          b0760e0d481cc7d11f8c99855e181bb271ec62aa

          SHA256

          82afeeb2877d32a8f3f3edaf8bcfc4d53fd0c136df4c00ad71314d27171844ca

          SHA512

          9e7167d8c66f31142844046f4e57bf952bfb22e2cacdefe4288919e5c7d38cdcc8d724f2cc162804fc6812ebfa1933ddc8ec55b84d6c00b822ceee98856fa104

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk938454.exe

          Filesize

          341KB

          MD5

          2834f9848a5c947b55e0f81ba0ac970d

          SHA1

          b0760e0d481cc7d11f8c99855e181bb271ec62aa

          SHA256

          82afeeb2877d32a8f3f3edaf8bcfc4d53fd0c136df4c00ad71314d27171844ca

          SHA512

          9e7167d8c66f31142844046f4e57bf952bfb22e2cacdefe4288919e5c7d38cdcc8d724f2cc162804fc6812ebfa1933ddc8ec55b84d6c00b822ceee98856fa104

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un201720.exe

          Filesize

          536KB

          MD5

          70ec3e610da158315b11779abd013ca4

          SHA1

          a661889f3babcd1fe804615a80de8405beab2f37

          SHA256

          44c059f9f9235906e407b0384e3077ab85e8ca7291bda337308892bd835eacec

          SHA512

          7c10ec1cd388be35d5edd398b0cfcfaa64f416e2817c76377a255a51b422ceed4b79ab7d9c611a2ea29cb63d26f39cd07d1466645d1e00ac8d1227e862aa39f4

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un201720.exe

          Filesize

          536KB

          MD5

          70ec3e610da158315b11779abd013ca4

          SHA1

          a661889f3babcd1fe804615a80de8405beab2f37

          SHA256

          44c059f9f9235906e407b0384e3077ab85e8ca7291bda337308892bd835eacec

          SHA512

          7c10ec1cd388be35d5edd398b0cfcfaa64f416e2817c76377a255a51b422ceed4b79ab7d9c611a2ea29cb63d26f39cd07d1466645d1e00ac8d1227e862aa39f4

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\79166204.exe

          Filesize

          259KB

          MD5

          fff151af9d83766ca0617e06d6ae0c1f

          SHA1

          3c4ce51db112e2f6978d58f6c40e7b2e88ce62c2

          SHA256

          9124f991b665f567a037338576a3e29d9db2d41d779e0c1aa9efb8bca859101b

          SHA512

          197355b3250d17adea2470211685b2f1db251998e0c09a52fd2d2a8474acfab861c642689db426f8e6bc4351b0d67f83845073d6fa8872ea46dccdd21b7395e6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\79166204.exe

          Filesize

          259KB

          MD5

          fff151af9d83766ca0617e06d6ae0c1f

          SHA1

          3c4ce51db112e2f6978d58f6c40e7b2e88ce62c2

          SHA256

          9124f991b665f567a037338576a3e29d9db2d41d779e0c1aa9efb8bca859101b

          SHA512

          197355b3250d17adea2470211685b2f1db251998e0c09a52fd2d2a8474acfab861c642689db426f8e6bc4351b0d67f83845073d6fa8872ea46dccdd21b7395e6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\79166204.exe

          Filesize

          259KB

          MD5

          fff151af9d83766ca0617e06d6ae0c1f

          SHA1

          3c4ce51db112e2f6978d58f6c40e7b2e88ce62c2

          SHA256

          9124f991b665f567a037338576a3e29d9db2d41d779e0c1aa9efb8bca859101b

          SHA512

          197355b3250d17adea2470211685b2f1db251998e0c09a52fd2d2a8474acfab861c642689db426f8e6bc4351b0d67f83845073d6fa8872ea46dccdd21b7395e6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk938454.exe

          Filesize

          341KB

          MD5

          2834f9848a5c947b55e0f81ba0ac970d

          SHA1

          b0760e0d481cc7d11f8c99855e181bb271ec62aa

          SHA256

          82afeeb2877d32a8f3f3edaf8bcfc4d53fd0c136df4c00ad71314d27171844ca

          SHA512

          9e7167d8c66f31142844046f4e57bf952bfb22e2cacdefe4288919e5c7d38cdcc8d724f2cc162804fc6812ebfa1933ddc8ec55b84d6c00b822ceee98856fa104

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk938454.exe

          Filesize

          341KB

          MD5

          2834f9848a5c947b55e0f81ba0ac970d

          SHA1

          b0760e0d481cc7d11f8c99855e181bb271ec62aa

          SHA256

          82afeeb2877d32a8f3f3edaf8bcfc4d53fd0c136df4c00ad71314d27171844ca

          SHA512

          9e7167d8c66f31142844046f4e57bf952bfb22e2cacdefe4288919e5c7d38cdcc8d724f2cc162804fc6812ebfa1933ddc8ec55b84d6c00b822ceee98856fa104

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk938454.exe

          Filesize

          341KB

          MD5

          2834f9848a5c947b55e0f81ba0ac970d

          SHA1

          b0760e0d481cc7d11f8c99855e181bb271ec62aa

          SHA256

          82afeeb2877d32a8f3f3edaf8bcfc4d53fd0c136df4c00ad71314d27171844ca

          SHA512

          9e7167d8c66f31142844046f4e57bf952bfb22e2cacdefe4288919e5c7d38cdcc8d724f2cc162804fc6812ebfa1933ddc8ec55b84d6c00b822ceee98856fa104

        • memory/908-110-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-84-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-88-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-86-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-92-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-90-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-96-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-94-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-100-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-98-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-104-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-102-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-108-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-106-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-83-0x0000000000A40000-0x0000000000A53000-memory.dmp

          Filesize

          76KB

        • memory/908-111-0x0000000000400000-0x0000000000455000-memory.dmp

          Filesize

          340KB

        • memory/908-82-0x0000000004B80000-0x0000000004BC0000-memory.dmp

          Filesize

          256KB

        • memory/908-81-0x0000000004B80000-0x0000000004BC0000-memory.dmp

          Filesize

          256KB

        • memory/908-80-0x0000000000300000-0x000000000032D000-memory.dmp

          Filesize

          180KB

        • memory/908-79-0x0000000000A40000-0x0000000000A58000-memory.dmp

          Filesize

          96KB

        • memory/908-78-0x0000000000A10000-0x0000000000A2A000-memory.dmp

          Filesize

          104KB

        • memory/908-113-0x0000000000400000-0x0000000000455000-memory.dmp

          Filesize

          340KB

        • memory/1688-125-0x0000000002290000-0x00000000022CA000-memory.dmp

          Filesize

          232KB

        • memory/1688-147-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-126-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-127-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-129-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-131-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-133-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-135-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-137-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-139-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-141-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-143-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-145-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-124-0x0000000002140000-0x000000000217C000-memory.dmp

          Filesize

          240KB

        • memory/1688-149-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-151-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-153-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-155-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-157-0x0000000002290000-0x00000000022C5000-memory.dmp

          Filesize

          212KB

        • memory/1688-160-0x0000000000330000-0x0000000000376000-memory.dmp

          Filesize

          280KB

        • memory/1688-164-0x0000000004A10000-0x0000000004A50000-memory.dmp

          Filesize

          256KB

        • memory/1688-162-0x0000000004A10000-0x0000000004A50000-memory.dmp

          Filesize

          256KB

        • memory/1688-921-0x0000000004A10000-0x0000000004A50000-memory.dmp

          Filesize

          256KB

        • memory/1688-923-0x0000000004A10000-0x0000000004A50000-memory.dmp

          Filesize

          256KB

        • memory/1688-925-0x0000000004A10000-0x0000000004A50000-memory.dmp

          Filesize

          256KB