Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:19

General

  • Target

    67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe

  • Size

    563KB

  • MD5

    2a56d4dc574313429b8cc406dfb1738a

  • SHA1

    ceee502b7f7d07cbe284af29f42ecfa43cbb04c1

  • SHA256

    67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f

  • SHA512

    60397aed026b96183ff36fa3440b36af3472552f7354b61e194cd3ac7599f85203fbb95c76909bbd1c7d5212520301274ca3997ee6e06f55dc5c2ee4a0e7403d

  • SSDEEP

    12288:ry90pBO5K98HT96/eyZvI0szd0mOz0M3qOW5L6jG:rykBOKLeyJ4WmOg4CAjG

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe
    "C:\Users\Admin\AppData\Local\Temp\67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV7919.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV7919.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it229709.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it229709.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp106247.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp106247.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV7919.exe

    Filesize

    409KB

    MD5

    39a55573830d5a25d55f2c3cfac9a7e3

    SHA1

    ae1c4740ec0506281b4b5a50cdb67e48aa7b2f5c

    SHA256

    bc73a08aa3853d0839c6d8edfa5da4811181911731c8ed1ee4f98ab7a721d6ec

    SHA512

    9fdd4a05f52d8cb03668b122ddb58d1be178f8a0ce387d79a447ab3c8c37c92e37f217bff91ba2ea41a395c69634382a79aceda10bd99735c0a8e88c398535dc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV7919.exe

    Filesize

    409KB

    MD5

    39a55573830d5a25d55f2c3cfac9a7e3

    SHA1

    ae1c4740ec0506281b4b5a50cdb67e48aa7b2f5c

    SHA256

    bc73a08aa3853d0839c6d8edfa5da4811181911731c8ed1ee4f98ab7a721d6ec

    SHA512

    9fdd4a05f52d8cb03668b122ddb58d1be178f8a0ce387d79a447ab3c8c37c92e37f217bff91ba2ea41a395c69634382a79aceda10bd99735c0a8e88c398535dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it229709.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it229709.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp106247.exe

    Filesize

    361KB

    MD5

    dbc5d834e73322453234c664081b9bca

    SHA1

    c652bf239c5b133dd1c776d95f8c6796db9a1568

    SHA256

    99d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b

    SHA512

    b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp106247.exe

    Filesize

    361KB

    MD5

    dbc5d834e73322453234c664081b9bca

    SHA1

    c652bf239c5b133dd1c776d95f8c6796db9a1568

    SHA256

    99d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b

    SHA512

    b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp106247.exe

    Filesize

    361KB

    MD5

    dbc5d834e73322453234c664081b9bca

    SHA1

    c652bf239c5b133dd1c776d95f8c6796db9a1568

    SHA256

    99d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b

    SHA512

    b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV7919.exe

    Filesize

    409KB

    MD5

    39a55573830d5a25d55f2c3cfac9a7e3

    SHA1

    ae1c4740ec0506281b4b5a50cdb67e48aa7b2f5c

    SHA256

    bc73a08aa3853d0839c6d8edfa5da4811181911731c8ed1ee4f98ab7a721d6ec

    SHA512

    9fdd4a05f52d8cb03668b122ddb58d1be178f8a0ce387d79a447ab3c8c37c92e37f217bff91ba2ea41a395c69634382a79aceda10bd99735c0a8e88c398535dc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV7919.exe

    Filesize

    409KB

    MD5

    39a55573830d5a25d55f2c3cfac9a7e3

    SHA1

    ae1c4740ec0506281b4b5a50cdb67e48aa7b2f5c

    SHA256

    bc73a08aa3853d0839c6d8edfa5da4811181911731c8ed1ee4f98ab7a721d6ec

    SHA512

    9fdd4a05f52d8cb03668b122ddb58d1be178f8a0ce387d79a447ab3c8c37c92e37f217bff91ba2ea41a395c69634382a79aceda10bd99735c0a8e88c398535dc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\it229709.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp106247.exe

    Filesize

    361KB

    MD5

    dbc5d834e73322453234c664081b9bca

    SHA1

    c652bf239c5b133dd1c776d95f8c6796db9a1568

    SHA256

    99d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b

    SHA512

    b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp106247.exe

    Filesize

    361KB

    MD5

    dbc5d834e73322453234c664081b9bca

    SHA1

    c652bf239c5b133dd1c776d95f8c6796db9a1568

    SHA256

    99d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b

    SHA512

    b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp106247.exe

    Filesize

    361KB

    MD5

    dbc5d834e73322453234c664081b9bca

    SHA1

    c652bf239c5b133dd1c776d95f8c6796db9a1568

    SHA256

    99d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b

    SHA512

    b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd

  • memory/1040-72-0x0000000000CC0000-0x0000000000CCA000-memory.dmp

    Filesize

    40KB

  • memory/1488-107-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-121-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-85-0x0000000004990000-0x00000000049CA000-memory.dmp

    Filesize

    232KB

  • memory/1488-86-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-87-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-89-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-91-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-93-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-95-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-97-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-99-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-101-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-103-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-105-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-83-0x00000000030D0000-0x0000000003116000-memory.dmp

    Filesize

    280KB

  • memory/1488-109-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-111-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-113-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-115-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-117-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-119-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-84-0x0000000004950000-0x000000000498C000-memory.dmp

    Filesize

    240KB

  • memory/1488-123-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-125-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-127-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-129-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-131-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-133-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-135-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-137-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-139-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-141-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-143-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-145-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-147-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-149-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1488-314-0x00000000073D0000-0x0000000007410000-memory.dmp

    Filesize

    256KB

  • memory/1488-316-0x00000000073D0000-0x0000000007410000-memory.dmp

    Filesize

    256KB

  • memory/1488-880-0x00000000073D0000-0x0000000007410000-memory.dmp

    Filesize

    256KB

  • memory/1488-882-0x00000000073D0000-0x0000000007410000-memory.dmp

    Filesize

    256KB

  • memory/1488-883-0x00000000073D0000-0x0000000007410000-memory.dmp

    Filesize

    256KB

  • memory/1488-884-0x00000000073D0000-0x0000000007410000-memory.dmp

    Filesize

    256KB

  • memory/1488-886-0x00000000073D0000-0x0000000007410000-memory.dmp

    Filesize

    256KB