Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:38

General

  • Target

    45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe

  • Size

    694KB

  • MD5

    fb8288fb85a084106231132ca55452f5

  • SHA1

    aa93f4e6b2a9132ec0bfd4005a2cbe30faabdde5

  • SHA256

    45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd

  • SHA512

    cd412d81663aead40c7a41274c87154f31b95f3e744ba4fadbff1c00352b75653b5a2309ce44eafc568fb7809f44a9c444eded4b605cb0e8c097425472b054e2

  • SSDEEP

    12288:jy90/IbtPmN86pw58bRaeqxOCgshsxgpqlni/VdUN0cRvbP56BKvym772KR:jyggM8Yw5yaxwzOsxgpqlKdUeabV1R

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe
    "C:\Users\Admin\AppData\Local\Temp\45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825493.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825493.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90836395.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90836395.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk316318.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk316318.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825493.exe

    Filesize

    540KB

    MD5

    1576036ac734b73c133b403e4dc1a193

    SHA1

    63cf762f7ee587fbb8bdc33c80f8678def0dd44f

    SHA256

    627bdeb929fe4f7fff0c13efbeb1153faa18b08fd37e047ccc86d626a6c21bc8

    SHA512

    e59859dccfa72b64f025f512a5f90aa7774b61d999105b3a03d7bc06dc10d9980ff065bfa2293b835f71fa7462f9a7d4f40d996e9ac284218759d124d5dd6a80

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825493.exe

    Filesize

    540KB

    MD5

    1576036ac734b73c133b403e4dc1a193

    SHA1

    63cf762f7ee587fbb8bdc33c80f8678def0dd44f

    SHA256

    627bdeb929fe4f7fff0c13efbeb1153faa18b08fd37e047ccc86d626a6c21bc8

    SHA512

    e59859dccfa72b64f025f512a5f90aa7774b61d999105b3a03d7bc06dc10d9980ff065bfa2293b835f71fa7462f9a7d4f40d996e9ac284218759d124d5dd6a80

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90836395.exe

    Filesize

    258KB

    MD5

    df5da51d8781c57e9b60047071820578

    SHA1

    0fe551eec1524cd3f7fb47c2740290aaf474dc95

    SHA256

    4c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e

    SHA512

    b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90836395.exe

    Filesize

    258KB

    MD5

    df5da51d8781c57e9b60047071820578

    SHA1

    0fe551eec1524cd3f7fb47c2740290aaf474dc95

    SHA256

    4c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e

    SHA512

    b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90836395.exe

    Filesize

    258KB

    MD5

    df5da51d8781c57e9b60047071820578

    SHA1

    0fe551eec1524cd3f7fb47c2740290aaf474dc95

    SHA256

    4c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e

    SHA512

    b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk316318.exe

    Filesize

    341KB

    MD5

    6fa97825cbee530ff2434a5522e4534e

    SHA1

    ed8a97c309337af777561e9daf07806d43dd9c09

    SHA256

    350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598

    SHA512

    cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk316318.exe

    Filesize

    341KB

    MD5

    6fa97825cbee530ff2434a5522e4534e

    SHA1

    ed8a97c309337af777561e9daf07806d43dd9c09

    SHA256

    350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598

    SHA512

    cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk316318.exe

    Filesize

    341KB

    MD5

    6fa97825cbee530ff2434a5522e4534e

    SHA1

    ed8a97c309337af777561e9daf07806d43dd9c09

    SHA256

    350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598

    SHA512

    cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un825493.exe

    Filesize

    540KB

    MD5

    1576036ac734b73c133b403e4dc1a193

    SHA1

    63cf762f7ee587fbb8bdc33c80f8678def0dd44f

    SHA256

    627bdeb929fe4f7fff0c13efbeb1153faa18b08fd37e047ccc86d626a6c21bc8

    SHA512

    e59859dccfa72b64f025f512a5f90aa7774b61d999105b3a03d7bc06dc10d9980ff065bfa2293b835f71fa7462f9a7d4f40d996e9ac284218759d124d5dd6a80

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un825493.exe

    Filesize

    540KB

    MD5

    1576036ac734b73c133b403e4dc1a193

    SHA1

    63cf762f7ee587fbb8bdc33c80f8678def0dd44f

    SHA256

    627bdeb929fe4f7fff0c13efbeb1153faa18b08fd37e047ccc86d626a6c21bc8

    SHA512

    e59859dccfa72b64f025f512a5f90aa7774b61d999105b3a03d7bc06dc10d9980ff065bfa2293b835f71fa7462f9a7d4f40d996e9ac284218759d124d5dd6a80

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\90836395.exe

    Filesize

    258KB

    MD5

    df5da51d8781c57e9b60047071820578

    SHA1

    0fe551eec1524cd3f7fb47c2740290aaf474dc95

    SHA256

    4c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e

    SHA512

    b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\90836395.exe

    Filesize

    258KB

    MD5

    df5da51d8781c57e9b60047071820578

    SHA1

    0fe551eec1524cd3f7fb47c2740290aaf474dc95

    SHA256

    4c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e

    SHA512

    b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\90836395.exe

    Filesize

    258KB

    MD5

    df5da51d8781c57e9b60047071820578

    SHA1

    0fe551eec1524cd3f7fb47c2740290aaf474dc95

    SHA256

    4c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e

    SHA512

    b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk316318.exe

    Filesize

    341KB

    MD5

    6fa97825cbee530ff2434a5522e4534e

    SHA1

    ed8a97c309337af777561e9daf07806d43dd9c09

    SHA256

    350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598

    SHA512

    cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk316318.exe

    Filesize

    341KB

    MD5

    6fa97825cbee530ff2434a5522e4534e

    SHA1

    ed8a97c309337af777561e9daf07806d43dd9c09

    SHA256

    350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598

    SHA512

    cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk316318.exe

    Filesize

    341KB

    MD5

    6fa97825cbee530ff2434a5522e4534e

    SHA1

    ed8a97c309337af777561e9daf07806d43dd9c09

    SHA256

    350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598

    SHA512

    cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015

  • memory/728-96-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-84-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-86-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-88-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-90-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-92-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-94-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-102-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-100-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-106-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-108-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-110-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-104-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-98-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-83-0x00000000045F0000-0x0000000004603000-memory.dmp

    Filesize

    76KB

  • memory/728-111-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/728-82-0x0000000007130000-0x0000000007170000-memory.dmp

    Filesize

    256KB

  • memory/728-80-0x0000000000260000-0x000000000028D000-memory.dmp

    Filesize

    180KB

  • memory/728-81-0x0000000007130000-0x0000000007170000-memory.dmp

    Filesize

    256KB

  • memory/728-79-0x00000000045F0000-0x0000000004608000-memory.dmp

    Filesize

    96KB

  • memory/728-78-0x0000000002D40000-0x0000000002D5A000-memory.dmp

    Filesize

    104KB

  • memory/728-112-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/972-124-0x00000000048F0000-0x000000000492A000-memory.dmp

    Filesize

    232KB

  • memory/972-142-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-125-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-126-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-128-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-130-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-132-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-134-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-136-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-138-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-140-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-123-0x00000000032B0000-0x00000000032EC000-memory.dmp

    Filesize

    240KB

  • memory/972-143-0x0000000002BB0000-0x0000000002BF6000-memory.dmp

    Filesize

    280KB

  • memory/972-145-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-151-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-149-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-147-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-153-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-157-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-155-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-159-0x00000000048F0000-0x0000000004925000-memory.dmp

    Filesize

    212KB

  • memory/972-918-0x0000000007290000-0x00000000072D0000-memory.dmp

    Filesize

    256KB

  • memory/972-921-0x0000000007290000-0x00000000072D0000-memory.dmp

    Filesize

    256KB