Analysis

  • max time kernel
    152s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:15

General

  • Target

    63e84d08e1dd4cea18405500edf05316a119f8ad40e76e9f835f175f973fe2b0.exe

  • Size

    746KB

  • MD5

    e7feaabf0fbfd987545a8a7a3130c93d

  • SHA1

    00dd68b968461e74aae6234b811cf8d9f96b92a6

  • SHA256

    63e84d08e1dd4cea18405500edf05316a119f8ad40e76e9f835f175f973fe2b0

  • SHA512

    798507d5b1dd0e1195a0371309f23093d8c09d286bb8a77b1d3a7fbd235514df04fb0eb3ea73d6fb8c684777f5da5bfa11af634fe8ab6aac621559c7abae31b8

  • SSDEEP

    12288:my90GoeOsgSTGKxL8EUbMrHasQOogovjCSd+UEv4Cvi/TWIoYp:my6mCKp8hYr6sopd+UCvOCR2

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63e84d08e1dd4cea18405500edf05316a119f8ad40e76e9f835f175f973fe2b0.exe
    "C:\Users\Admin\AppData\Local\Temp\63e84d08e1dd4cea18405500edf05316a119f8ad40e76e9f835f175f973fe2b0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un492466.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un492466.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36674300.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36674300.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk118569.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk118569.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:804

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un492466.exe

          Filesize

          592KB

          MD5

          308a9700b1d6e872108ac20ac9455059

          SHA1

          4635bebd1d82fa9c3044ca456d8ac62803809368

          SHA256

          f6fb09703bb58662be3c312ee8a1d52cfb578ba3029593cd7a0291774ebccf9a

          SHA512

          eb47b63c08d7e39cec765fb30bd2342c4d1e215e44fbf3a8b79ebc09b31f1b3ace27f832b82c5e5055f3c0d616b1e29c8ccb329cf64f0f9535badc7badd3c8bb

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un492466.exe

          Filesize

          592KB

          MD5

          308a9700b1d6e872108ac20ac9455059

          SHA1

          4635bebd1d82fa9c3044ca456d8ac62803809368

          SHA256

          f6fb09703bb58662be3c312ee8a1d52cfb578ba3029593cd7a0291774ebccf9a

          SHA512

          eb47b63c08d7e39cec765fb30bd2342c4d1e215e44fbf3a8b79ebc09b31f1b3ace27f832b82c5e5055f3c0d616b1e29c8ccb329cf64f0f9535badc7badd3c8bb

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36674300.exe

          Filesize

          377KB

          MD5

          fef51f5b79f751e2069f91f40cc37bfe

          SHA1

          3a4a126f7498e2e50eb8bfb9e338f082da9df290

          SHA256

          c601d2b359f86fa36fed70482da9e4b28a413bc900a0a8570c3879239401b56c

          SHA512

          29235d7e4927287dd17f1dc5626328c38dbeb62f238f77d30185f1569cc84d365934beaf357cf1eeb28cf7800e8f09687eb8d444a07fd6834aa17f6a02863957

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36674300.exe

          Filesize

          377KB

          MD5

          fef51f5b79f751e2069f91f40cc37bfe

          SHA1

          3a4a126f7498e2e50eb8bfb9e338f082da9df290

          SHA256

          c601d2b359f86fa36fed70482da9e4b28a413bc900a0a8570c3879239401b56c

          SHA512

          29235d7e4927287dd17f1dc5626328c38dbeb62f238f77d30185f1569cc84d365934beaf357cf1eeb28cf7800e8f09687eb8d444a07fd6834aa17f6a02863957

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36674300.exe

          Filesize

          377KB

          MD5

          fef51f5b79f751e2069f91f40cc37bfe

          SHA1

          3a4a126f7498e2e50eb8bfb9e338f082da9df290

          SHA256

          c601d2b359f86fa36fed70482da9e4b28a413bc900a0a8570c3879239401b56c

          SHA512

          29235d7e4927287dd17f1dc5626328c38dbeb62f238f77d30185f1569cc84d365934beaf357cf1eeb28cf7800e8f09687eb8d444a07fd6834aa17f6a02863957

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk118569.exe

          Filesize

          459KB

          MD5

          46bdaea7e939210224b56921751e12b2

          SHA1

          4764cc4722a3c4f9ddac0f6819bd0a2f3ecab1f2

          SHA256

          0eaa29c1a044108f58d5c2da0dd53eccea37dd7daa75ac73c5f47c57cab33cc2

          SHA512

          03633c0a45c9a997be70789aef1ec563d09b0d64d19a99b351b88637c3875155c4a83cf492610609f2ed5784f8eefc587857bdcf66e5e9b7e2c4f470dd628e1c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk118569.exe

          Filesize

          459KB

          MD5

          46bdaea7e939210224b56921751e12b2

          SHA1

          4764cc4722a3c4f9ddac0f6819bd0a2f3ecab1f2

          SHA256

          0eaa29c1a044108f58d5c2da0dd53eccea37dd7daa75ac73c5f47c57cab33cc2

          SHA512

          03633c0a45c9a997be70789aef1ec563d09b0d64d19a99b351b88637c3875155c4a83cf492610609f2ed5784f8eefc587857bdcf66e5e9b7e2c4f470dd628e1c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk118569.exe

          Filesize

          459KB

          MD5

          46bdaea7e939210224b56921751e12b2

          SHA1

          4764cc4722a3c4f9ddac0f6819bd0a2f3ecab1f2

          SHA256

          0eaa29c1a044108f58d5c2da0dd53eccea37dd7daa75ac73c5f47c57cab33cc2

          SHA512

          03633c0a45c9a997be70789aef1ec563d09b0d64d19a99b351b88637c3875155c4a83cf492610609f2ed5784f8eefc587857bdcf66e5e9b7e2c4f470dd628e1c

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un492466.exe

          Filesize

          592KB

          MD5

          308a9700b1d6e872108ac20ac9455059

          SHA1

          4635bebd1d82fa9c3044ca456d8ac62803809368

          SHA256

          f6fb09703bb58662be3c312ee8a1d52cfb578ba3029593cd7a0291774ebccf9a

          SHA512

          eb47b63c08d7e39cec765fb30bd2342c4d1e215e44fbf3a8b79ebc09b31f1b3ace27f832b82c5e5055f3c0d616b1e29c8ccb329cf64f0f9535badc7badd3c8bb

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un492466.exe

          Filesize

          592KB

          MD5

          308a9700b1d6e872108ac20ac9455059

          SHA1

          4635bebd1d82fa9c3044ca456d8ac62803809368

          SHA256

          f6fb09703bb58662be3c312ee8a1d52cfb578ba3029593cd7a0291774ebccf9a

          SHA512

          eb47b63c08d7e39cec765fb30bd2342c4d1e215e44fbf3a8b79ebc09b31f1b3ace27f832b82c5e5055f3c0d616b1e29c8ccb329cf64f0f9535badc7badd3c8bb

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\36674300.exe

          Filesize

          377KB

          MD5

          fef51f5b79f751e2069f91f40cc37bfe

          SHA1

          3a4a126f7498e2e50eb8bfb9e338f082da9df290

          SHA256

          c601d2b359f86fa36fed70482da9e4b28a413bc900a0a8570c3879239401b56c

          SHA512

          29235d7e4927287dd17f1dc5626328c38dbeb62f238f77d30185f1569cc84d365934beaf357cf1eeb28cf7800e8f09687eb8d444a07fd6834aa17f6a02863957

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\36674300.exe

          Filesize

          377KB

          MD5

          fef51f5b79f751e2069f91f40cc37bfe

          SHA1

          3a4a126f7498e2e50eb8bfb9e338f082da9df290

          SHA256

          c601d2b359f86fa36fed70482da9e4b28a413bc900a0a8570c3879239401b56c

          SHA512

          29235d7e4927287dd17f1dc5626328c38dbeb62f238f77d30185f1569cc84d365934beaf357cf1eeb28cf7800e8f09687eb8d444a07fd6834aa17f6a02863957

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\36674300.exe

          Filesize

          377KB

          MD5

          fef51f5b79f751e2069f91f40cc37bfe

          SHA1

          3a4a126f7498e2e50eb8bfb9e338f082da9df290

          SHA256

          c601d2b359f86fa36fed70482da9e4b28a413bc900a0a8570c3879239401b56c

          SHA512

          29235d7e4927287dd17f1dc5626328c38dbeb62f238f77d30185f1569cc84d365934beaf357cf1eeb28cf7800e8f09687eb8d444a07fd6834aa17f6a02863957

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk118569.exe

          Filesize

          459KB

          MD5

          46bdaea7e939210224b56921751e12b2

          SHA1

          4764cc4722a3c4f9ddac0f6819bd0a2f3ecab1f2

          SHA256

          0eaa29c1a044108f58d5c2da0dd53eccea37dd7daa75ac73c5f47c57cab33cc2

          SHA512

          03633c0a45c9a997be70789aef1ec563d09b0d64d19a99b351b88637c3875155c4a83cf492610609f2ed5784f8eefc587857bdcf66e5e9b7e2c4f470dd628e1c

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk118569.exe

          Filesize

          459KB

          MD5

          46bdaea7e939210224b56921751e12b2

          SHA1

          4764cc4722a3c4f9ddac0f6819bd0a2f3ecab1f2

          SHA256

          0eaa29c1a044108f58d5c2da0dd53eccea37dd7daa75ac73c5f47c57cab33cc2

          SHA512

          03633c0a45c9a997be70789aef1ec563d09b0d64d19a99b351b88637c3875155c4a83cf492610609f2ed5784f8eefc587857bdcf66e5e9b7e2c4f470dd628e1c

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk118569.exe

          Filesize

          459KB

          MD5

          46bdaea7e939210224b56921751e12b2

          SHA1

          4764cc4722a3c4f9ddac0f6819bd0a2f3ecab1f2

          SHA256

          0eaa29c1a044108f58d5c2da0dd53eccea37dd7daa75ac73c5f47c57cab33cc2

          SHA512

          03633c0a45c9a997be70789aef1ec563d09b0d64d19a99b351b88637c3875155c4a83cf492610609f2ed5784f8eefc587857bdcf66e5e9b7e2c4f470dd628e1c

        • memory/804-152-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-138-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-156-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-154-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-127-0x0000000002550000-0x000000000258C000-memory.dmp

          Filesize

          240KB

        • memory/804-150-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-148-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-146-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-144-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-142-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-140-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-158-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-136-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-134-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-132-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-130-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-129-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-128-0x0000000002590000-0x00000000025CA000-memory.dmp

          Filesize

          232KB

        • memory/804-160-0x0000000002590000-0x00000000025C5000-memory.dmp

          Filesize

          212KB

        • memory/804-229-0x0000000000820000-0x0000000000866000-memory.dmp

          Filesize

          280KB

        • memory/804-231-0x0000000004F60000-0x0000000004FA0000-memory.dmp

          Filesize

          256KB

        • memory/804-923-0x0000000004F60000-0x0000000004FA0000-memory.dmp

          Filesize

          256KB

        • memory/804-925-0x0000000004F60000-0x0000000004FA0000-memory.dmp

          Filesize

          256KB

        • memory/804-927-0x0000000004F60000-0x0000000004FA0000-memory.dmp

          Filesize

          256KB

        • memory/1528-84-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/1528-116-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/1528-111-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-113-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-109-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-105-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-107-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-101-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-103-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-93-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-97-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-99-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-95-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-91-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-89-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-87-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-86-0x00000000024F0000-0x0000000002502000-memory.dmp

          Filesize

          72KB

        • memory/1528-85-0x00000000025B0000-0x00000000025F0000-memory.dmp

          Filesize

          256KB

        • memory/1528-83-0x00000000025B0000-0x00000000025F0000-memory.dmp

          Filesize

          256KB

        • memory/1528-82-0x00000000025B0000-0x00000000025F0000-memory.dmp

          Filesize

          256KB

        • memory/1528-81-0x00000000024F0000-0x0000000002508000-memory.dmp

          Filesize

          96KB

        • memory/1528-80-0x00000000025B0000-0x00000000025F0000-memory.dmp

          Filesize

          256KB

        • memory/1528-79-0x0000000000B50000-0x0000000000B7D000-memory.dmp

          Filesize

          180KB

        • memory/1528-78-0x0000000000C00000-0x0000000000C1A000-memory.dmp

          Filesize

          104KB