Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:33

General

  • Target

    f88707f4eb4cd5cbe3601891afa8d7b4720d05e68b9657a418bd2a65e514972d.exe

  • Size

    618KB

  • MD5

    f90b61e794beda203213421d79172ccd

  • SHA1

    24c4050f341a6de75c07cd39e86c68e47d1e8b77

  • SHA256

    f88707f4eb4cd5cbe3601891afa8d7b4720d05e68b9657a418bd2a65e514972d

  • SHA512

    9ae89b9cfdccee65ea0c27ecd1a72464dbd20129a2e5e7acd595b440fead608bcea73e03cbe4699737b77287910602b3f4b9c118b55bb54f7731c78022a1784d

  • SSDEEP

    12288:cy90l8fOmzPMxZVYj0oKgovNHsS199wkcsOAhsVHTH2FR2J38PuLn:cyaJXceggNHsSIsPhsVHTH27GLn

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f88707f4eb4cd5cbe3601891afa8d7b4720d05e68b9657a418bd2a65e514972d.exe
    "C:\Users\Admin\AppData\Local\Temp\f88707f4eb4cd5cbe3601891afa8d7b4720d05e68b9657a418bd2a65e514972d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st586175.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st586175.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\81168359.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\81168359.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp636413.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp636413.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:2020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st586175.exe

    Filesize

    464KB

    MD5

    8e9f213222305c69dfa3499fbb1d1109

    SHA1

    68f36d31f26b82c056b200782d176c79a934b32c

    SHA256

    f7412016b282461270a108381381269db93d8dbb1dfd0ef943c21dfee91734b1

    SHA512

    9200ea52143da4aeeb555103cb13f383b9a2918c39daabf8b9f6892769750c1b2cfbff1fdc2f8e21fcea92c2c61224e786a339c59b6474712de7c7306d06548b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st586175.exe

    Filesize

    464KB

    MD5

    8e9f213222305c69dfa3499fbb1d1109

    SHA1

    68f36d31f26b82c056b200782d176c79a934b32c

    SHA256

    f7412016b282461270a108381381269db93d8dbb1dfd0ef943c21dfee91734b1

    SHA512

    9200ea52143da4aeeb555103cb13f383b9a2918c39daabf8b9f6892769750c1b2cfbff1fdc2f8e21fcea92c2c61224e786a339c59b6474712de7c7306d06548b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\81168359.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\81168359.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp636413.exe

    Filesize

    478KB

    MD5

    e69f814d41d29a07cdd2854a241e98ca

    SHA1

    5ed94665b4b5d86cc2ff8fa843b372d9afdaf3c0

    SHA256

    334c5906475e3404b4454005d6e3434e029837830d42c94c1fa8291786894d52

    SHA512

    517fce968f72a7edfb254a94efe15296b69efae5ca2970e0eec8edbdc314e65678ec69ab2b4689c3ae28f0605a79a082b19fc71d18da1ccbb28927318b954668

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp636413.exe

    Filesize

    478KB

    MD5

    e69f814d41d29a07cdd2854a241e98ca

    SHA1

    5ed94665b4b5d86cc2ff8fa843b372d9afdaf3c0

    SHA256

    334c5906475e3404b4454005d6e3434e029837830d42c94c1fa8291786894d52

    SHA512

    517fce968f72a7edfb254a94efe15296b69efae5ca2970e0eec8edbdc314e65678ec69ab2b4689c3ae28f0605a79a082b19fc71d18da1ccbb28927318b954668

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp636413.exe

    Filesize

    478KB

    MD5

    e69f814d41d29a07cdd2854a241e98ca

    SHA1

    5ed94665b4b5d86cc2ff8fa843b372d9afdaf3c0

    SHA256

    334c5906475e3404b4454005d6e3434e029837830d42c94c1fa8291786894d52

    SHA512

    517fce968f72a7edfb254a94efe15296b69efae5ca2970e0eec8edbdc314e65678ec69ab2b4689c3ae28f0605a79a082b19fc71d18da1ccbb28927318b954668

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st586175.exe

    Filesize

    464KB

    MD5

    8e9f213222305c69dfa3499fbb1d1109

    SHA1

    68f36d31f26b82c056b200782d176c79a934b32c

    SHA256

    f7412016b282461270a108381381269db93d8dbb1dfd0ef943c21dfee91734b1

    SHA512

    9200ea52143da4aeeb555103cb13f383b9a2918c39daabf8b9f6892769750c1b2cfbff1fdc2f8e21fcea92c2c61224e786a339c59b6474712de7c7306d06548b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st586175.exe

    Filesize

    464KB

    MD5

    8e9f213222305c69dfa3499fbb1d1109

    SHA1

    68f36d31f26b82c056b200782d176c79a934b32c

    SHA256

    f7412016b282461270a108381381269db93d8dbb1dfd0ef943c21dfee91734b1

    SHA512

    9200ea52143da4aeeb555103cb13f383b9a2918c39daabf8b9f6892769750c1b2cfbff1fdc2f8e21fcea92c2c61224e786a339c59b6474712de7c7306d06548b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\81168359.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp636413.exe

    Filesize

    478KB

    MD5

    e69f814d41d29a07cdd2854a241e98ca

    SHA1

    5ed94665b4b5d86cc2ff8fa843b372d9afdaf3c0

    SHA256

    334c5906475e3404b4454005d6e3434e029837830d42c94c1fa8291786894d52

    SHA512

    517fce968f72a7edfb254a94efe15296b69efae5ca2970e0eec8edbdc314e65678ec69ab2b4689c3ae28f0605a79a082b19fc71d18da1ccbb28927318b954668

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp636413.exe

    Filesize

    478KB

    MD5

    e69f814d41d29a07cdd2854a241e98ca

    SHA1

    5ed94665b4b5d86cc2ff8fa843b372d9afdaf3c0

    SHA256

    334c5906475e3404b4454005d6e3434e029837830d42c94c1fa8291786894d52

    SHA512

    517fce968f72a7edfb254a94efe15296b69efae5ca2970e0eec8edbdc314e65678ec69ab2b4689c3ae28f0605a79a082b19fc71d18da1ccbb28927318b954668

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp636413.exe

    Filesize

    478KB

    MD5

    e69f814d41d29a07cdd2854a241e98ca

    SHA1

    5ed94665b4b5d86cc2ff8fa843b372d9afdaf3c0

    SHA256

    334c5906475e3404b4454005d6e3434e029837830d42c94c1fa8291786894d52

    SHA512

    517fce968f72a7edfb254a94efe15296b69efae5ca2970e0eec8edbdc314e65678ec69ab2b4689c3ae28f0605a79a082b19fc71d18da1ccbb28927318b954668

  • memory/1184-72-0x0000000000100000-0x000000000010A000-memory.dmp

    Filesize

    40KB

  • memory/2020-104-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-118-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-85-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-86-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-88-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-90-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-92-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-98-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-96-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-94-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-100-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-102-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-83-0x0000000002440000-0x000000000247C000-memory.dmp

    Filesize

    240KB

  • memory/2020-106-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-108-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-110-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-112-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-114-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-116-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-84-0x00000000025B0000-0x00000000025EA000-memory.dmp

    Filesize

    232KB

  • memory/2020-120-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-122-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-124-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-127-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-128-0x0000000004FE0000-0x0000000005020000-memory.dmp

    Filesize

    256KB

  • memory/2020-126-0x0000000000290000-0x00000000002D6000-memory.dmp

    Filesize

    280KB

  • memory/2020-130-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-132-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-134-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-136-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-138-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-140-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-142-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-144-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-146-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-148-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-150-0x00000000025B0000-0x00000000025E5000-memory.dmp

    Filesize

    212KB

  • memory/2020-879-0x0000000004FE0000-0x0000000005020000-memory.dmp

    Filesize

    256KB

  • memory/2020-882-0x0000000004FE0000-0x0000000005020000-memory.dmp

    Filesize

    256KB