Analysis

  • max time kernel
    150s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 22:22

General

  • Target

    6a0fd52012926bced3c7c551f27ba345b8cdbfe8462f48b81671bde2702e4766.exe

  • Size

    1.5MB

  • MD5

    3fea863686ae1eeaaa56b91d7ae2b5ba

  • SHA1

    b49cd2d6cea2db1188a9ff27d8bec40342d61691

  • SHA256

    6a0fd52012926bced3c7c551f27ba345b8cdbfe8462f48b81671bde2702e4766

  • SHA512

    f49e8f295ccca3985fba7ab64029c2dde108ec5bd9de39282c67d63df293c98b215c4bac7bba36e6919905c991dff7b01e3fbdf2bca41a15aeeaa0ff4e969ccc

  • SSDEEP

    24576:wy+Tz7NL9zt4a9IJJTFGF5ZTUXXG/Jmav/iIVCPhPfh+r/p:3+Tz7jR92JIFsnGxRacCPJ5

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a0fd52012926bced3c7c551f27ba345b8cdbfe8462f48b81671bde2702e4766.exe
    "C:\Users\Admin\AppData\Local\Temp\6a0fd52012926bced3c7c551f27ba345b8cdbfe8462f48b81671bde2702e4766.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713775.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713775.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8114114.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8114114.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4592525.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4592525.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:684
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7569805.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7569805.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:868
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5687081.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5687081.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:800
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8880821.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8880821.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713775.exe

    Filesize

    1.4MB

    MD5

    0803135a2b5ffe59320553142f64c6d1

    SHA1

    5cce330b28d07eb239f1768fbbadd69b343e2d1c

    SHA256

    12bc1f0140ab13874d794af8959d2d4f5ad8711714d7d212b8f59299196c8f04

    SHA512

    d4fc101796aa02d13c245d041bf0d6dd0dbf706434b41c4ff2269b785ea3b9d6613c0d407d946c56d5611a5aed1e6491638bf753ad676b1d50bdecea696a19c2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713775.exe

    Filesize

    1.4MB

    MD5

    0803135a2b5ffe59320553142f64c6d1

    SHA1

    5cce330b28d07eb239f1768fbbadd69b343e2d1c

    SHA256

    12bc1f0140ab13874d794af8959d2d4f5ad8711714d7d212b8f59299196c8f04

    SHA512

    d4fc101796aa02d13c245d041bf0d6dd0dbf706434b41c4ff2269b785ea3b9d6613c0d407d946c56d5611a5aed1e6491638bf753ad676b1d50bdecea696a19c2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8114114.exe

    Filesize

    916KB

    MD5

    f713adbd31e640342e45e18d71e864a1

    SHA1

    663ff04e08a11b611ce0e27b9cabe3e9ded947a5

    SHA256

    4b91c27ed9e42efd024f2628bed25c0891bce367e2b33c1d98652e8a064b23fe

    SHA512

    074e5eab2ebff6e75794576ab55bf7f3f890cc11031785041f41e94c9d9ab64c161cb257f5f86d22391a3bc19489019bebe78cc3959eb4f02ec37fe4ff260f8d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8114114.exe

    Filesize

    916KB

    MD5

    f713adbd31e640342e45e18d71e864a1

    SHA1

    663ff04e08a11b611ce0e27b9cabe3e9ded947a5

    SHA256

    4b91c27ed9e42efd024f2628bed25c0891bce367e2b33c1d98652e8a064b23fe

    SHA512

    074e5eab2ebff6e75794576ab55bf7f3f890cc11031785041f41e94c9d9ab64c161cb257f5f86d22391a3bc19489019bebe78cc3959eb4f02ec37fe4ff260f8d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4592525.exe

    Filesize

    712KB

    MD5

    69a21bcc7a837736c72b13650dba6198

    SHA1

    d13f24ee6f5511b20e981463440dbe5018b60d76

    SHA256

    6053eddab1cd12bc84585152409af84cb9f8052a468d59ff6883ee9ea0ef3855

    SHA512

    5deb9e8c35e0eea9a053afee9adc899cf74926e9d0b6408b9ccf7f0791555ad27475fe19ecf54a23443c544b981690b8aedad39fd9c2c9caae413b9b422f19e4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4592525.exe

    Filesize

    712KB

    MD5

    69a21bcc7a837736c72b13650dba6198

    SHA1

    d13f24ee6f5511b20e981463440dbe5018b60d76

    SHA256

    6053eddab1cd12bc84585152409af84cb9f8052a468d59ff6883ee9ea0ef3855

    SHA512

    5deb9e8c35e0eea9a053afee9adc899cf74926e9d0b6408b9ccf7f0791555ad27475fe19ecf54a23443c544b981690b8aedad39fd9c2c9caae413b9b422f19e4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7569805.exe

    Filesize

    422KB

    MD5

    7254b27604e6c8377bcbef17f59529c1

    SHA1

    46c0a18b34f3f154afb49e1f94955a948460bc4c

    SHA256

    22c5c9568ed1c15480ea31ca19c2792cc221e0f56ae3e4615b387cdb8208f437

    SHA512

    b52ce81956e12f1a94c1aa39fd4d24d1f367796a1b68b4386e936793f04e3f5c857f1fd7a41e3cf88be09bac84bac6bca286fbd46bf48544e3ff3fb9e3cde7d5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7569805.exe

    Filesize

    422KB

    MD5

    7254b27604e6c8377bcbef17f59529c1

    SHA1

    46c0a18b34f3f154afb49e1f94955a948460bc4c

    SHA256

    22c5c9568ed1c15480ea31ca19c2792cc221e0f56ae3e4615b387cdb8208f437

    SHA512

    b52ce81956e12f1a94c1aa39fd4d24d1f367796a1b68b4386e936793f04e3f5c857f1fd7a41e3cf88be09bac84bac6bca286fbd46bf48544e3ff3fb9e3cde7d5

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5687081.exe

    Filesize

    371KB

    MD5

    c056013b9500dcb49a1ed6c83a78bca2

    SHA1

    73868dd0b619895153c77ef04e709854b26c4072

    SHA256

    90dc8c38df84426211214da29e93ce2edd967333c6cb8db5fe77294d85e417c0

    SHA512

    85d8d76801f3a8c685d68f7163315071016e8e8774c5c65acf71fe0d727787e0b0ceaae2dbd154d1dd0810d66636dc205eb1e7a66ec6e8d38be50b905f7100f1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5687081.exe

    Filesize

    371KB

    MD5

    c056013b9500dcb49a1ed6c83a78bca2

    SHA1

    73868dd0b619895153c77ef04e709854b26c4072

    SHA256

    90dc8c38df84426211214da29e93ce2edd967333c6cb8db5fe77294d85e417c0

    SHA512

    85d8d76801f3a8c685d68f7163315071016e8e8774c5c65acf71fe0d727787e0b0ceaae2dbd154d1dd0810d66636dc205eb1e7a66ec6e8d38be50b905f7100f1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5687081.exe

    Filesize

    371KB

    MD5

    c056013b9500dcb49a1ed6c83a78bca2

    SHA1

    73868dd0b619895153c77ef04e709854b26c4072

    SHA256

    90dc8c38df84426211214da29e93ce2edd967333c6cb8db5fe77294d85e417c0

    SHA512

    85d8d76801f3a8c685d68f7163315071016e8e8774c5c65acf71fe0d727787e0b0ceaae2dbd154d1dd0810d66636dc205eb1e7a66ec6e8d38be50b905f7100f1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8880821.exe

    Filesize

    136KB

    MD5

    5fabdea12cd1693ab66a45e803699b99

    SHA1

    644fcc26f7a7f0955a6b29ebfc8223aeb6a354ed

    SHA256

    ea704adbd3c3005b9852e77fc8bd8d6daa2567f1f1169dbc8a56cd89eea08b10

    SHA512

    338252dee66964d9a6402b10be7f0c102cd8456eb95ee3406b77768ff224a874eed37b1c527be7373e5a68e6c3969659fc7afb28d19ca7278ddc5f1d77bd35b4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8880821.exe

    Filesize

    136KB

    MD5

    5fabdea12cd1693ab66a45e803699b99

    SHA1

    644fcc26f7a7f0955a6b29ebfc8223aeb6a354ed

    SHA256

    ea704adbd3c3005b9852e77fc8bd8d6daa2567f1f1169dbc8a56cd89eea08b10

    SHA512

    338252dee66964d9a6402b10be7f0c102cd8456eb95ee3406b77768ff224a874eed37b1c527be7373e5a68e6c3969659fc7afb28d19ca7278ddc5f1d77bd35b4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713775.exe

    Filesize

    1.4MB

    MD5

    0803135a2b5ffe59320553142f64c6d1

    SHA1

    5cce330b28d07eb239f1768fbbadd69b343e2d1c

    SHA256

    12bc1f0140ab13874d794af8959d2d4f5ad8711714d7d212b8f59299196c8f04

    SHA512

    d4fc101796aa02d13c245d041bf0d6dd0dbf706434b41c4ff2269b785ea3b9d6613c0d407d946c56d5611a5aed1e6491638bf753ad676b1d50bdecea696a19c2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713775.exe

    Filesize

    1.4MB

    MD5

    0803135a2b5ffe59320553142f64c6d1

    SHA1

    5cce330b28d07eb239f1768fbbadd69b343e2d1c

    SHA256

    12bc1f0140ab13874d794af8959d2d4f5ad8711714d7d212b8f59299196c8f04

    SHA512

    d4fc101796aa02d13c245d041bf0d6dd0dbf706434b41c4ff2269b785ea3b9d6613c0d407d946c56d5611a5aed1e6491638bf753ad676b1d50bdecea696a19c2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8114114.exe

    Filesize

    916KB

    MD5

    f713adbd31e640342e45e18d71e864a1

    SHA1

    663ff04e08a11b611ce0e27b9cabe3e9ded947a5

    SHA256

    4b91c27ed9e42efd024f2628bed25c0891bce367e2b33c1d98652e8a064b23fe

    SHA512

    074e5eab2ebff6e75794576ab55bf7f3f890cc11031785041f41e94c9d9ab64c161cb257f5f86d22391a3bc19489019bebe78cc3959eb4f02ec37fe4ff260f8d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8114114.exe

    Filesize

    916KB

    MD5

    f713adbd31e640342e45e18d71e864a1

    SHA1

    663ff04e08a11b611ce0e27b9cabe3e9ded947a5

    SHA256

    4b91c27ed9e42efd024f2628bed25c0891bce367e2b33c1d98652e8a064b23fe

    SHA512

    074e5eab2ebff6e75794576ab55bf7f3f890cc11031785041f41e94c9d9ab64c161cb257f5f86d22391a3bc19489019bebe78cc3959eb4f02ec37fe4ff260f8d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4592525.exe

    Filesize

    712KB

    MD5

    69a21bcc7a837736c72b13650dba6198

    SHA1

    d13f24ee6f5511b20e981463440dbe5018b60d76

    SHA256

    6053eddab1cd12bc84585152409af84cb9f8052a468d59ff6883ee9ea0ef3855

    SHA512

    5deb9e8c35e0eea9a053afee9adc899cf74926e9d0b6408b9ccf7f0791555ad27475fe19ecf54a23443c544b981690b8aedad39fd9c2c9caae413b9b422f19e4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4592525.exe

    Filesize

    712KB

    MD5

    69a21bcc7a837736c72b13650dba6198

    SHA1

    d13f24ee6f5511b20e981463440dbe5018b60d76

    SHA256

    6053eddab1cd12bc84585152409af84cb9f8052a468d59ff6883ee9ea0ef3855

    SHA512

    5deb9e8c35e0eea9a053afee9adc899cf74926e9d0b6408b9ccf7f0791555ad27475fe19ecf54a23443c544b981690b8aedad39fd9c2c9caae413b9b422f19e4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7569805.exe

    Filesize

    422KB

    MD5

    7254b27604e6c8377bcbef17f59529c1

    SHA1

    46c0a18b34f3f154afb49e1f94955a948460bc4c

    SHA256

    22c5c9568ed1c15480ea31ca19c2792cc221e0f56ae3e4615b387cdb8208f437

    SHA512

    b52ce81956e12f1a94c1aa39fd4d24d1f367796a1b68b4386e936793f04e3f5c857f1fd7a41e3cf88be09bac84bac6bca286fbd46bf48544e3ff3fb9e3cde7d5

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7569805.exe

    Filesize

    422KB

    MD5

    7254b27604e6c8377bcbef17f59529c1

    SHA1

    46c0a18b34f3f154afb49e1f94955a948460bc4c

    SHA256

    22c5c9568ed1c15480ea31ca19c2792cc221e0f56ae3e4615b387cdb8208f437

    SHA512

    b52ce81956e12f1a94c1aa39fd4d24d1f367796a1b68b4386e936793f04e3f5c857f1fd7a41e3cf88be09bac84bac6bca286fbd46bf48544e3ff3fb9e3cde7d5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5687081.exe

    Filesize

    371KB

    MD5

    c056013b9500dcb49a1ed6c83a78bca2

    SHA1

    73868dd0b619895153c77ef04e709854b26c4072

    SHA256

    90dc8c38df84426211214da29e93ce2edd967333c6cb8db5fe77294d85e417c0

    SHA512

    85d8d76801f3a8c685d68f7163315071016e8e8774c5c65acf71fe0d727787e0b0ceaae2dbd154d1dd0810d66636dc205eb1e7a66ec6e8d38be50b905f7100f1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5687081.exe

    Filesize

    371KB

    MD5

    c056013b9500dcb49a1ed6c83a78bca2

    SHA1

    73868dd0b619895153c77ef04e709854b26c4072

    SHA256

    90dc8c38df84426211214da29e93ce2edd967333c6cb8db5fe77294d85e417c0

    SHA512

    85d8d76801f3a8c685d68f7163315071016e8e8774c5c65acf71fe0d727787e0b0ceaae2dbd154d1dd0810d66636dc205eb1e7a66ec6e8d38be50b905f7100f1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5687081.exe

    Filesize

    371KB

    MD5

    c056013b9500dcb49a1ed6c83a78bca2

    SHA1

    73868dd0b619895153c77ef04e709854b26c4072

    SHA256

    90dc8c38df84426211214da29e93ce2edd967333c6cb8db5fe77294d85e417c0

    SHA512

    85d8d76801f3a8c685d68f7163315071016e8e8774c5c65acf71fe0d727787e0b0ceaae2dbd154d1dd0810d66636dc205eb1e7a66ec6e8d38be50b905f7100f1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8880821.exe

    Filesize

    136KB

    MD5

    5fabdea12cd1693ab66a45e803699b99

    SHA1

    644fcc26f7a7f0955a6b29ebfc8223aeb6a354ed

    SHA256

    ea704adbd3c3005b9852e77fc8bd8d6daa2567f1f1169dbc8a56cd89eea08b10

    SHA512

    338252dee66964d9a6402b10be7f0c102cd8456eb95ee3406b77768ff224a874eed37b1c527be7373e5a68e6c3969659fc7afb28d19ca7278ddc5f1d77bd35b4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8880821.exe

    Filesize

    136KB

    MD5

    5fabdea12cd1693ab66a45e803699b99

    SHA1

    644fcc26f7a7f0955a6b29ebfc8223aeb6a354ed

    SHA256

    ea704adbd3c3005b9852e77fc8bd8d6daa2567f1f1169dbc8a56cd89eea08b10

    SHA512

    338252dee66964d9a6402b10be7f0c102cd8456eb95ee3406b77768ff224a874eed37b1c527be7373e5a68e6c3969659fc7afb28d19ca7278ddc5f1d77bd35b4

  • memory/800-113-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-138-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/800-117-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-119-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-121-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-123-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-125-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-127-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-129-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-131-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-133-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-135-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-137-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-115-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-140-0x0000000000CC0000-0x0000000000D00000-memory.dmp

    Filesize

    256KB

  • memory/800-139-0x0000000000CC0000-0x0000000000D00000-memory.dmp

    Filesize

    256KB

  • memory/800-141-0x0000000000400000-0x00000000006F6000-memory.dmp

    Filesize

    3.0MB

  • memory/800-142-0x0000000000CC0000-0x0000000000D00000-memory.dmp

    Filesize

    256KB

  • memory/800-143-0x0000000000CC0000-0x0000000000D00000-memory.dmp

    Filesize

    256KB

  • memory/800-145-0x0000000000400000-0x00000000006F6000-memory.dmp

    Filesize

    3.0MB

  • memory/800-110-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-111-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/800-109-0x0000000000D80000-0x0000000000D98000-memory.dmp

    Filesize

    96KB

  • memory/800-108-0x0000000000D40000-0x0000000000D5A000-memory.dmp

    Filesize

    104KB

  • memory/1924-152-0x0000000000A20000-0x0000000000A48000-memory.dmp

    Filesize

    160KB

  • memory/1924-153-0x0000000006F50000-0x0000000006F90000-memory.dmp

    Filesize

    256KB

  • memory/1924-154-0x0000000006F50000-0x0000000006F90000-memory.dmp

    Filesize

    256KB