Analysis

  • max time kernel
    147s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 20:35

General

  • Target

    fa5d18899c7e01709b1e3c77ba674bb9afd04224eee31aefb5fa520cf44740dc.exe

  • Size

    745KB

  • MD5

    e2eab84ffeb179c14f697d6d6daa8157

  • SHA1

    6580b67d0062c8bfae23c765d9cfcff77fabdd4c

  • SHA256

    fa5d18899c7e01709b1e3c77ba674bb9afd04224eee31aefb5fa520cf44740dc

  • SHA512

    fc4f90b1c1c55f88f9616141bd71fe51aa83a5f7bf96da5c744a589cf0d889164232ab89a81f4af65c795105c3784c6a4174d0c9abba74168a4d6d5304f9cd34

  • SSDEEP

    12288:by90hdBTVKFEeAkHfDbQePJzrX3TXXfSGUgaYnx7DCeM:byodBTEFEhSD8cvTXXfCgaYnx7DCeM

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa5d18899c7e01709b1e3c77ba674bb9afd04224eee31aefb5fa520cf44740dc.exe
    "C:\Users\Admin\AppData\Local\Temp\fa5d18899c7e01709b1e3c77ba674bb9afd04224eee31aefb5fa520cf44740dc.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692317.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692317.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692317.exe

    Filesize

    591KB

    MD5

    98958c29b128613cdd9ec27f452a5d62

    SHA1

    169d29cabcdb2f07ffb3511166b625ef32ba77ae

    SHA256

    7e060debd8851f456e466af53fd3ef5a4638679bedfa5b2ece1afae3a70cf08f

    SHA512

    0fd2fae045f0b5a9f05c21fdf0220991134e0e47634e8dec07066a8ba2b8158bb3902385347a49301aa3320210c90691e8e843514083e849cbdda6a1ab0e3a75

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692317.exe

    Filesize

    591KB

    MD5

    98958c29b128613cdd9ec27f452a5d62

    SHA1

    169d29cabcdb2f07ffb3511166b625ef32ba77ae

    SHA256

    7e060debd8851f456e466af53fd3ef5a4638679bedfa5b2ece1afae3a70cf08f

    SHA512

    0fd2fae045f0b5a9f05c21fdf0220991134e0e47634e8dec07066a8ba2b8158bb3902385347a49301aa3320210c90691e8e843514083e849cbdda6a1ab0e3a75

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe

    Filesize

    376KB

    MD5

    7b1f205d2c75bca47cfe640282989d49

    SHA1

    abbed1d3bd9a5c58f6768596bbbde82b5074bf6f

    SHA256

    d0dbae5482ca3f77161822ccba6b89a3fc45cc5456f252bf760a65749c0460c0

    SHA512

    820f89c89e694db349a8d077ca325b977d6ea06bf6226ba294b257ad63b55ff997f5d2f1628c8d8ed7e87edc4088359f8d3825ca1bc68a188b7772643dc45884

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe

    Filesize

    376KB

    MD5

    7b1f205d2c75bca47cfe640282989d49

    SHA1

    abbed1d3bd9a5c58f6768596bbbde82b5074bf6f

    SHA256

    d0dbae5482ca3f77161822ccba6b89a3fc45cc5456f252bf760a65749c0460c0

    SHA512

    820f89c89e694db349a8d077ca325b977d6ea06bf6226ba294b257ad63b55ff997f5d2f1628c8d8ed7e87edc4088359f8d3825ca1bc68a188b7772643dc45884

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe

    Filesize

    376KB

    MD5

    7b1f205d2c75bca47cfe640282989d49

    SHA1

    abbed1d3bd9a5c58f6768596bbbde82b5074bf6f

    SHA256

    d0dbae5482ca3f77161822ccba6b89a3fc45cc5456f252bf760a65749c0460c0

    SHA512

    820f89c89e694db349a8d077ca325b977d6ea06bf6226ba294b257ad63b55ff997f5d2f1628c8d8ed7e87edc4088359f8d3825ca1bc68a188b7772643dc45884

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe

    Filesize

    459KB

    MD5

    6f24bfaa1cf53b6da8e13c280b257e9b

    SHA1

    c727ff6fa06f111ac9cba2623f65f2a7a9155128

    SHA256

    fb5d4c38294f7244091ad5c68097260572ca65ec165deead5013ee67073481e9

    SHA512

    a8b7cff2a2134b48f5cee5a0ec37c4246e0a1f54b12cce58078471b6c43771f77fbc6c06df04f65877375a3d990e9feb4fc7e7730fda0786c0c4453ce8ffc0f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe

    Filesize

    459KB

    MD5

    6f24bfaa1cf53b6da8e13c280b257e9b

    SHA1

    c727ff6fa06f111ac9cba2623f65f2a7a9155128

    SHA256

    fb5d4c38294f7244091ad5c68097260572ca65ec165deead5013ee67073481e9

    SHA512

    a8b7cff2a2134b48f5cee5a0ec37c4246e0a1f54b12cce58078471b6c43771f77fbc6c06df04f65877375a3d990e9feb4fc7e7730fda0786c0c4453ce8ffc0f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe

    Filesize

    459KB

    MD5

    6f24bfaa1cf53b6da8e13c280b257e9b

    SHA1

    c727ff6fa06f111ac9cba2623f65f2a7a9155128

    SHA256

    fb5d4c38294f7244091ad5c68097260572ca65ec165deead5013ee67073481e9

    SHA512

    a8b7cff2a2134b48f5cee5a0ec37c4246e0a1f54b12cce58078471b6c43771f77fbc6c06df04f65877375a3d990e9feb4fc7e7730fda0786c0c4453ce8ffc0f0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un692317.exe

    Filesize

    591KB

    MD5

    98958c29b128613cdd9ec27f452a5d62

    SHA1

    169d29cabcdb2f07ffb3511166b625ef32ba77ae

    SHA256

    7e060debd8851f456e466af53fd3ef5a4638679bedfa5b2ece1afae3a70cf08f

    SHA512

    0fd2fae045f0b5a9f05c21fdf0220991134e0e47634e8dec07066a8ba2b8158bb3902385347a49301aa3320210c90691e8e843514083e849cbdda6a1ab0e3a75

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un692317.exe

    Filesize

    591KB

    MD5

    98958c29b128613cdd9ec27f452a5d62

    SHA1

    169d29cabcdb2f07ffb3511166b625ef32ba77ae

    SHA256

    7e060debd8851f456e466af53fd3ef5a4638679bedfa5b2ece1afae3a70cf08f

    SHA512

    0fd2fae045f0b5a9f05c21fdf0220991134e0e47634e8dec07066a8ba2b8158bb3902385347a49301aa3320210c90691e8e843514083e849cbdda6a1ab0e3a75

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe

    Filesize

    376KB

    MD5

    7b1f205d2c75bca47cfe640282989d49

    SHA1

    abbed1d3bd9a5c58f6768596bbbde82b5074bf6f

    SHA256

    d0dbae5482ca3f77161822ccba6b89a3fc45cc5456f252bf760a65749c0460c0

    SHA512

    820f89c89e694db349a8d077ca325b977d6ea06bf6226ba294b257ad63b55ff997f5d2f1628c8d8ed7e87edc4088359f8d3825ca1bc68a188b7772643dc45884

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe

    Filesize

    376KB

    MD5

    7b1f205d2c75bca47cfe640282989d49

    SHA1

    abbed1d3bd9a5c58f6768596bbbde82b5074bf6f

    SHA256

    d0dbae5482ca3f77161822ccba6b89a3fc45cc5456f252bf760a65749c0460c0

    SHA512

    820f89c89e694db349a8d077ca325b977d6ea06bf6226ba294b257ad63b55ff997f5d2f1628c8d8ed7e87edc4088359f8d3825ca1bc68a188b7772643dc45884

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe

    Filesize

    376KB

    MD5

    7b1f205d2c75bca47cfe640282989d49

    SHA1

    abbed1d3bd9a5c58f6768596bbbde82b5074bf6f

    SHA256

    d0dbae5482ca3f77161822ccba6b89a3fc45cc5456f252bf760a65749c0460c0

    SHA512

    820f89c89e694db349a8d077ca325b977d6ea06bf6226ba294b257ad63b55ff997f5d2f1628c8d8ed7e87edc4088359f8d3825ca1bc68a188b7772643dc45884

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe

    Filesize

    459KB

    MD5

    6f24bfaa1cf53b6da8e13c280b257e9b

    SHA1

    c727ff6fa06f111ac9cba2623f65f2a7a9155128

    SHA256

    fb5d4c38294f7244091ad5c68097260572ca65ec165deead5013ee67073481e9

    SHA512

    a8b7cff2a2134b48f5cee5a0ec37c4246e0a1f54b12cce58078471b6c43771f77fbc6c06df04f65877375a3d990e9feb4fc7e7730fda0786c0c4453ce8ffc0f0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe

    Filesize

    459KB

    MD5

    6f24bfaa1cf53b6da8e13c280b257e9b

    SHA1

    c727ff6fa06f111ac9cba2623f65f2a7a9155128

    SHA256

    fb5d4c38294f7244091ad5c68097260572ca65ec165deead5013ee67073481e9

    SHA512

    a8b7cff2a2134b48f5cee5a0ec37c4246e0a1f54b12cce58078471b6c43771f77fbc6c06df04f65877375a3d990e9feb4fc7e7730fda0786c0c4453ce8ffc0f0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe

    Filesize

    459KB

    MD5

    6f24bfaa1cf53b6da8e13c280b257e9b

    SHA1

    c727ff6fa06f111ac9cba2623f65f2a7a9155128

    SHA256

    fb5d4c38294f7244091ad5c68097260572ca65ec165deead5013ee67073481e9

    SHA512

    a8b7cff2a2134b48f5cee5a0ec37c4246e0a1f54b12cce58078471b6c43771f77fbc6c06df04f65877375a3d990e9feb4fc7e7730fda0786c0c4453ce8ffc0f0

  • memory/572-89-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-87-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-93-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-91-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-97-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-95-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-101-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-99-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-105-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-103-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-107-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-108-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/572-109-0x0000000005140000-0x0000000005180000-memory.dmp

    Filesize

    256KB

  • memory/572-110-0x0000000005140000-0x0000000005180000-memory.dmp

    Filesize

    256KB

  • memory/572-111-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/572-112-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/572-83-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-85-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-81-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-80-0x0000000000F50000-0x0000000000F62000-memory.dmp

    Filesize

    72KB

  • memory/572-79-0x0000000000F50000-0x0000000000F68000-memory.dmp

    Filesize

    96KB

  • memory/572-78-0x00000000008A0000-0x00000000008BA000-memory.dmp

    Filesize

    104KB

  • memory/1736-126-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB

  • memory/1736-141-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-124-0x0000000000290000-0x00000000002D6000-memory.dmp

    Filesize

    280KB

  • memory/1736-123-0x0000000002580000-0x00000000025BC000-memory.dmp

    Filesize

    240KB

  • memory/1736-127-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB

  • memory/1736-128-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-135-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-133-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-131-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-129-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-137-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-139-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-143-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-125-0x00000000025C0000-0x00000000025FA000-memory.dmp

    Filesize

    232KB

  • memory/1736-145-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-147-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-149-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-151-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-153-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-155-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-157-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-159-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-161-0x00000000025C0000-0x00000000025F5000-memory.dmp

    Filesize

    212KB

  • memory/1736-750-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB

  • memory/1736-921-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB

  • memory/1736-923-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB

  • memory/1736-925-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB