Analysis

  • max time kernel
    247s
  • max time network
    263s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:38

General

  • Target

    456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe

  • Size

    1.1MB

  • MD5

    b0edf7c4c6f773458a3ffa41a2fca79e

  • SHA1

    ea6b51e39da69283609d5f8618f66b979553dee2

  • SHA256

    456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662

  • SHA512

    9c525c2c23b182d982850201129e9faebe0f7dc7b4335970084975cb7215221ff923744ecb0988ae0d66e0183a123e1cc3636ca556395c3104f9bc8ecca85c39

  • SSDEEP

    24576:pybVdr/xCt5UH8c+ywgfJfyWBNNUP2eikkjcvmKWn6wsesikNuah:cRdNCtibwO1LS2eikkUi3s9ua

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe
    "C:\Users\Admin\AppData\Local\Temp\456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LO655528.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LO655528.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fe660286.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fe660286.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\um589945.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\um589945.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1548
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\159217571.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\159217571.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1340
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\275990756.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\275990756.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4232

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LO655528.exe

    Filesize

    993KB

    MD5

    6ab9f70a80fdaa2e573cbd1aaa2bb152

    SHA1

    7820cb85e5db36c6ce1f5d62797f1d9d4a60a932

    SHA256

    e57b26ea635f191f13b17c809cfefd5bbc04d27edbfc1eb938f7dd4aae1d79ec

    SHA512

    4900d7d2be0d993378b6b063fe7a245f555255f58095a133a1c730be42bfd433fe47243d71c14bd18d339932284f663b8ed68f2bc7da2cf62b1cbf56c5a92b6c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LO655528.exe

    Filesize

    993KB

    MD5

    6ab9f70a80fdaa2e573cbd1aaa2bb152

    SHA1

    7820cb85e5db36c6ce1f5d62797f1d9d4a60a932

    SHA256

    e57b26ea635f191f13b17c809cfefd5bbc04d27edbfc1eb938f7dd4aae1d79ec

    SHA512

    4900d7d2be0d993378b6b063fe7a245f555255f58095a133a1c730be42bfd433fe47243d71c14bd18d339932284f663b8ed68f2bc7da2cf62b1cbf56c5a92b6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fe660286.exe

    Filesize

    610KB

    MD5

    ff3f88a5ed0fd4d148738e5dcf3ca01e

    SHA1

    4b48c950b8296b06b6fa1988cdf11e1e4cfb40ac

    SHA256

    f8a0e82fb0d0ec809be421fabb8145cb1196c8598710caded74799a8eb83c7ed

    SHA512

    9eb67787730149a7d44215e32410b86fea28a51ba93af9d5a98a2a49fb194b2199586d5a5bbde7784b2c6ad0f4732cbc62b409ea6e0d93bf7dc392e520ca7bc6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fe660286.exe

    Filesize

    610KB

    MD5

    ff3f88a5ed0fd4d148738e5dcf3ca01e

    SHA1

    4b48c950b8296b06b6fa1988cdf11e1e4cfb40ac

    SHA256

    f8a0e82fb0d0ec809be421fabb8145cb1196c8598710caded74799a8eb83c7ed

    SHA512

    9eb67787730149a7d44215e32410b86fea28a51ba93af9d5a98a2a49fb194b2199586d5a5bbde7784b2c6ad0f4732cbc62b409ea6e0d93bf7dc392e520ca7bc6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\um589945.exe

    Filesize

    438KB

    MD5

    0c3c0bfa0ba7a36c734589f0978d4fc1

    SHA1

    b12cf27406680091cd524fb18ba2d57858f84de4

    SHA256

    b3a880c119322b3a4df8d9a6b3b427e252cf14eea9edb03d8e1a8f6a1417bd2a

    SHA512

    0b3b5eefc40a18a9b3696d3952294bd752413b8e93fd46177c355e5cf6d95357157187922e2da3bdaae42f145d60a7b50b6bbdc7721e92b54d5df3653e82806d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\um589945.exe

    Filesize

    438KB

    MD5

    0c3c0bfa0ba7a36c734589f0978d4fc1

    SHA1

    b12cf27406680091cd524fb18ba2d57858f84de4

    SHA256

    b3a880c119322b3a4df8d9a6b3b427e252cf14eea9edb03d8e1a8f6a1417bd2a

    SHA512

    0b3b5eefc40a18a9b3696d3952294bd752413b8e93fd46177c355e5cf6d95357157187922e2da3bdaae42f145d60a7b50b6bbdc7721e92b54d5df3653e82806d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\159217571.exe

    Filesize

    175KB

    MD5

    18f26d5b7807e83a640d0aef71b8f117

    SHA1

    1d9f19996df202b24b5f8c5e731ff415c8bbb1d4

    SHA256

    cad646c545054153e3e6a79aba8ac20b6295f3100ecb2f6432a3c74705b5fe67

    SHA512

    ca732e7a317846d56e899a8a6a1edb2830dab6f9a8b82876bf056b79a95e3f37e78d8b0a486bf5cde540624206ac55e4d57f07a11426eea8442308b9bae33a2a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\159217571.exe

    Filesize

    175KB

    MD5

    18f26d5b7807e83a640d0aef71b8f117

    SHA1

    1d9f19996df202b24b5f8c5e731ff415c8bbb1d4

    SHA256

    cad646c545054153e3e6a79aba8ac20b6295f3100ecb2f6432a3c74705b5fe67

    SHA512

    ca732e7a317846d56e899a8a6a1edb2830dab6f9a8b82876bf056b79a95e3f37e78d8b0a486bf5cde540624206ac55e4d57f07a11426eea8442308b9bae33a2a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\275990756.exe

    Filesize

    333KB

    MD5

    d851fbe103fb519cba93f470e272a846

    SHA1

    bf630a24124909cb7693b4cfb4bcd016fe4b58fb

    SHA256

    d5bb153f7224ed9f341e188fe5ba26806b1f1c71d1a5290972a32128fe990d78

    SHA512

    b2062c20f5df541e0ca67a144dc0b43c476e42c1f6f8a6d2164cb247cfc60d855d6b7cfe9d7736a6047036faf0d5ccb2ec03df05fd705b45622a38c349c4e4ce

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\275990756.exe

    Filesize

    333KB

    MD5

    d851fbe103fb519cba93f470e272a846

    SHA1

    bf630a24124909cb7693b4cfb4bcd016fe4b58fb

    SHA256

    d5bb153f7224ed9f341e188fe5ba26806b1f1c71d1a5290972a32128fe990d78

    SHA512

    b2062c20f5df541e0ca67a144dc0b43c476e42c1f6f8a6d2164cb247cfc60d855d6b7cfe9d7736a6047036faf0d5ccb2ec03df05fd705b45622a38c349c4e4ce

  • memory/1340-161-0x0000000004B50000-0x00000000050F4000-memory.dmp

    Filesize

    5.6MB

  • memory/1340-163-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-162-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-165-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-169-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-167-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-171-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1340-172-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-173-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1340-176-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-175-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1340-178-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-180-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-182-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-184-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-186-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-188-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-190-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-192-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/1340-193-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1340-194-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1340-195-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4232-202-0x0000000001FC0000-0x0000000001FED000-memory.dmp

    Filesize

    180KB

  • memory/4232-203-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4232-204-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-205-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-207-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-209-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-211-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-213-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-215-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-217-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-219-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-221-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-223-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-225-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-227-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-229-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-231-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4232-232-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4232-233-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4232-234-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4232-235-0x0000000001FC0000-0x0000000001FED000-memory.dmp

    Filesize

    180KB

  • memory/4232-237-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4232-238-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4232-239-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4232-240-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB