Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 21:32

General

  • Target

    409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe

  • Size

    690KB

  • MD5

    bedec3f68e81c94687011bd42826fa30

  • SHA1

    d9330ea0651fe8dc507bf875731226e23e20aecd

  • SHA256

    409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c

  • SHA512

    40c632f546d9d6170cbecbbed902edd499a4629802a6f8bece11c0cdad2abf82882ea57c1a11e9553fbde7d791ab3ae98fb613c410ebaf9cc04425dd28968c63

  • SSDEEP

    12288:Py90w95D1XSpkeYUA4LHfMI7Bwh74ZQIJoM00yK12VB9Kl2CiEMjiJEV:Pyx5pckeYUA4LfnKhLPMTyS2+diZ+K

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe
    "C:\Users\Admin\AppData\Local\Temp\409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe

    Filesize

    536KB

    MD5

    91f383cb9a29abec482915613fd6524d

    SHA1

    62a3388432be26273ed153f9684d7ecb68b1dd71

    SHA256

    2183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda

    SHA512

    828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe

    Filesize

    536KB

    MD5

    91f383cb9a29abec482915613fd6524d

    SHA1

    62a3388432be26273ed153f9684d7ecb68b1dd71

    SHA256

    2183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda

    SHA512

    828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe

    Filesize

    259KB

    MD5

    28946ab545213bc4d521c744fd29fbf4

    SHA1

    d983b5e4c30b55373df177351d6e2cafb85ed5f3

    SHA256

    f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa

    SHA512

    e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe

    Filesize

    259KB

    MD5

    28946ab545213bc4d521c744fd29fbf4

    SHA1

    d983b5e4c30b55373df177351d6e2cafb85ed5f3

    SHA256

    f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa

    SHA512

    e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe

    Filesize

    259KB

    MD5

    28946ab545213bc4d521c744fd29fbf4

    SHA1

    d983b5e4c30b55373df177351d6e2cafb85ed5f3

    SHA256

    f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa

    SHA512

    e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe

    Filesize

    341KB

    MD5

    511371d6be0a0826c6e4eed3915d5f3d

    SHA1

    e5d1538059bdd1c3e369dfa7f0f389f45530bf94

    SHA256

    817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a

    SHA512

    961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe

    Filesize

    341KB

    MD5

    511371d6be0a0826c6e4eed3915d5f3d

    SHA1

    e5d1538059bdd1c3e369dfa7f0f389f45530bf94

    SHA256

    817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a

    SHA512

    961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe

    Filesize

    341KB

    MD5

    511371d6be0a0826c6e4eed3915d5f3d

    SHA1

    e5d1538059bdd1c3e369dfa7f0f389f45530bf94

    SHA256

    817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a

    SHA512

    961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe

    Filesize

    536KB

    MD5

    91f383cb9a29abec482915613fd6524d

    SHA1

    62a3388432be26273ed153f9684d7ecb68b1dd71

    SHA256

    2183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda

    SHA512

    828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe

    Filesize

    536KB

    MD5

    91f383cb9a29abec482915613fd6524d

    SHA1

    62a3388432be26273ed153f9684d7ecb68b1dd71

    SHA256

    2183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda

    SHA512

    828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe

    Filesize

    259KB

    MD5

    28946ab545213bc4d521c744fd29fbf4

    SHA1

    d983b5e4c30b55373df177351d6e2cafb85ed5f3

    SHA256

    f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa

    SHA512

    e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe

    Filesize

    259KB

    MD5

    28946ab545213bc4d521c744fd29fbf4

    SHA1

    d983b5e4c30b55373df177351d6e2cafb85ed5f3

    SHA256

    f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa

    SHA512

    e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe

    Filesize

    259KB

    MD5

    28946ab545213bc4d521c744fd29fbf4

    SHA1

    d983b5e4c30b55373df177351d6e2cafb85ed5f3

    SHA256

    f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa

    SHA512

    e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe

    Filesize

    341KB

    MD5

    511371d6be0a0826c6e4eed3915d5f3d

    SHA1

    e5d1538059bdd1c3e369dfa7f0f389f45530bf94

    SHA256

    817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a

    SHA512

    961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe

    Filesize

    341KB

    MD5

    511371d6be0a0826c6e4eed3915d5f3d

    SHA1

    e5d1538059bdd1c3e369dfa7f0f389f45530bf94

    SHA256

    817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a

    SHA512

    961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe

    Filesize

    341KB

    MD5

    511371d6be0a0826c6e4eed3915d5f3d

    SHA1

    e5d1538059bdd1c3e369dfa7f0f389f45530bf94

    SHA256

    817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a

    SHA512

    961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0

  • memory/1556-141-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-151-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-925-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1556-924-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1556-923-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1556-920-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1556-429-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1556-427-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1556-425-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1556-423-0x0000000000270000-0x00000000002B6000-memory.dmp

    Filesize

    280KB

  • memory/1556-157-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-155-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-153-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-149-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-147-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-145-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-143-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-139-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-137-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-135-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-133-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-122-0x0000000000CC0000-0x0000000000CFC000-memory.dmp

    Filesize

    240KB

  • memory/1556-123-0x0000000000D00000-0x0000000000D3A000-memory.dmp

    Filesize

    232KB

  • memory/1556-124-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-125-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-127-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-129-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1556-131-0x0000000000D00000-0x0000000000D35000-memory.dmp

    Filesize

    212KB

  • memory/1948-109-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-78-0x0000000000390000-0x00000000003AA000-memory.dmp

    Filesize

    104KB

  • memory/1948-79-0x00000000003D0000-0x00000000003E8000-memory.dmp

    Filesize

    96KB

  • memory/1948-107-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-105-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-83-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-85-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-111-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1948-110-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1948-87-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-81-0x00000000020F0000-0x0000000002130000-memory.dmp

    Filesize

    256KB

  • memory/1948-80-0x0000000000250000-0x000000000027D000-memory.dmp

    Filesize

    180KB

  • memory/1948-82-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-103-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-101-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-93-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-95-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-97-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-99-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-91-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB

  • memory/1948-89-0x00000000003D0000-0x00000000003E3000-memory.dmp

    Filesize

    76KB