Analysis

  • max time kernel
    224s
  • max time network
    311s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 21:39

General

  • Target

    45fdee6076799ce9ba8cb7c4e607bc802685c871ee3124d68fdcddb3f021ed1e.exe

  • Size

    651KB

  • MD5

    5bca55938216c45c17dfe520d3539716

  • SHA1

    3416b55d593b977ff499392b7527c95dddf18cb5

  • SHA256

    45fdee6076799ce9ba8cb7c4e607bc802685c871ee3124d68fdcddb3f021ed1e

  • SHA512

    8e46a8b26f54b97113bc70cc31ff5917822fcfdfe160a43c191143f384d52132e31235b92300cae3bf48fb0fcb1682389a380f39d2de516174e1d3ea489a4a2c

  • SSDEEP

    12288:ey90rDkzqvQivHtJhPKDF2J3WDC0xF72dmQinfCrVvVn:ey8DxVtJhPKD6Whx2d5infCrNp

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45fdee6076799ce9ba8cb7c4e607bc802685c871ee3124d68fdcddb3f021ed1e.exe
    "C:\Users\Admin\AppData\Local\Temp\45fdee6076799ce9ba8cb7c4e607bc802685c871ee3124d68fdcddb3f021ed1e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st959190.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st959190.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65649283.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65649283.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp885847.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp885847.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st959190.exe

    Filesize

    497KB

    MD5

    ddb7b04835a4d27aabbfcb874bb5ec12

    SHA1

    1faaf6c2268bc6552aac28abe6f52ee176777d10

    SHA256

    daf02d2544d1d45af384697e93d9aad1cdac1b4c4b8b0b493369e057bd4cd421

    SHA512

    a7305c3bad3d0a52a117b5ef8a70e15f05866163cc66e0e4496a8cda573cac907de6b0bed565d6161562d9409bd19f366eec2ba5362a473812af6f8f47487348

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st959190.exe

    Filesize

    497KB

    MD5

    ddb7b04835a4d27aabbfcb874bb5ec12

    SHA1

    1faaf6c2268bc6552aac28abe6f52ee176777d10

    SHA256

    daf02d2544d1d45af384697e93d9aad1cdac1b4c4b8b0b493369e057bd4cd421

    SHA512

    a7305c3bad3d0a52a117b5ef8a70e15f05866163cc66e0e4496a8cda573cac907de6b0bed565d6161562d9409bd19f366eec2ba5362a473812af6f8f47487348

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65649283.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65649283.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp885847.exe

    Filesize

    341KB

    MD5

    a36bd17c34421699cf5e5d65bccbb399

    SHA1

    c90ab681bb88e85ee81cdec7e515069a14ad8163

    SHA256

    d5056be7062d719192d6195f6a4094f43c26042445af3096808cf178d1b6b0dd

    SHA512

    4071a927c3a9ba24fdb578e7ba576ac51fc5d68c4218309be46bb157fbd45ad5accb8daa45126902abf08581f9f3af2024781a8e3868ae59cd03041cf969d21d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp885847.exe

    Filesize

    341KB

    MD5

    a36bd17c34421699cf5e5d65bccbb399

    SHA1

    c90ab681bb88e85ee81cdec7e515069a14ad8163

    SHA256

    d5056be7062d719192d6195f6a4094f43c26042445af3096808cf178d1b6b0dd

    SHA512

    4071a927c3a9ba24fdb578e7ba576ac51fc5d68c4218309be46bb157fbd45ad5accb8daa45126902abf08581f9f3af2024781a8e3868ae59cd03041cf969d21d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp885847.exe

    Filesize

    341KB

    MD5

    a36bd17c34421699cf5e5d65bccbb399

    SHA1

    c90ab681bb88e85ee81cdec7e515069a14ad8163

    SHA256

    d5056be7062d719192d6195f6a4094f43c26042445af3096808cf178d1b6b0dd

    SHA512

    4071a927c3a9ba24fdb578e7ba576ac51fc5d68c4218309be46bb157fbd45ad5accb8daa45126902abf08581f9f3af2024781a8e3868ae59cd03041cf969d21d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st959190.exe

    Filesize

    497KB

    MD5

    ddb7b04835a4d27aabbfcb874bb5ec12

    SHA1

    1faaf6c2268bc6552aac28abe6f52ee176777d10

    SHA256

    daf02d2544d1d45af384697e93d9aad1cdac1b4c4b8b0b493369e057bd4cd421

    SHA512

    a7305c3bad3d0a52a117b5ef8a70e15f05866163cc66e0e4496a8cda573cac907de6b0bed565d6161562d9409bd19f366eec2ba5362a473812af6f8f47487348

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st959190.exe

    Filesize

    497KB

    MD5

    ddb7b04835a4d27aabbfcb874bb5ec12

    SHA1

    1faaf6c2268bc6552aac28abe6f52ee176777d10

    SHA256

    daf02d2544d1d45af384697e93d9aad1cdac1b4c4b8b0b493369e057bd4cd421

    SHA512

    a7305c3bad3d0a52a117b5ef8a70e15f05866163cc66e0e4496a8cda573cac907de6b0bed565d6161562d9409bd19f366eec2ba5362a473812af6f8f47487348

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\65649283.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\65649283.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp885847.exe

    Filesize

    341KB

    MD5

    a36bd17c34421699cf5e5d65bccbb399

    SHA1

    c90ab681bb88e85ee81cdec7e515069a14ad8163

    SHA256

    d5056be7062d719192d6195f6a4094f43c26042445af3096808cf178d1b6b0dd

    SHA512

    4071a927c3a9ba24fdb578e7ba576ac51fc5d68c4218309be46bb157fbd45ad5accb8daa45126902abf08581f9f3af2024781a8e3868ae59cd03041cf969d21d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp885847.exe

    Filesize

    341KB

    MD5

    a36bd17c34421699cf5e5d65bccbb399

    SHA1

    c90ab681bb88e85ee81cdec7e515069a14ad8163

    SHA256

    d5056be7062d719192d6195f6a4094f43c26042445af3096808cf178d1b6b0dd

    SHA512

    4071a927c3a9ba24fdb578e7ba576ac51fc5d68c4218309be46bb157fbd45ad5accb8daa45126902abf08581f9f3af2024781a8e3868ae59cd03041cf969d21d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp885847.exe

    Filesize

    341KB

    MD5

    a36bd17c34421699cf5e5d65bccbb399

    SHA1

    c90ab681bb88e85ee81cdec7e515069a14ad8163

    SHA256

    d5056be7062d719192d6195f6a4094f43c26042445af3096808cf178d1b6b0dd

    SHA512

    4071a927c3a9ba24fdb578e7ba576ac51fc5d68c4218309be46bb157fbd45ad5accb8daa45126902abf08581f9f3af2024781a8e3868ae59cd03041cf969d21d

  • memory/1720-89-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-85-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-87-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-83-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-91-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-93-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-95-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-97-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-99-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-101-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-103-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-104-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/1720-105-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/1720-106-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/1720-108-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/1720-107-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/1720-109-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/1720-81-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-79-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-77-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-76-0x0000000000740000-0x0000000000753000-memory.dmp

    Filesize

    76KB

  • memory/1720-75-0x0000000000740000-0x0000000000758000-memory.dmp

    Filesize

    96KB

  • memory/1720-74-0x00000000003D0000-0x00000000003EA000-memory.dmp

    Filesize

    104KB

  • memory/1832-124-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-146-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-122-0x00000000022B0000-0x00000000022EA000-memory.dmp

    Filesize

    232KB

  • memory/1832-123-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-120-0x0000000000370000-0x00000000003B6000-memory.dmp

    Filesize

    280KB

  • memory/1832-126-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-128-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-130-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-132-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-134-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-136-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-138-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-140-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-142-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-144-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-121-0x0000000002120000-0x000000000215C000-memory.dmp

    Filesize

    240KB

  • memory/1832-148-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-150-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-152-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-154-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-156-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-158-0x00000000022B0000-0x00000000022E5000-memory.dmp

    Filesize

    212KB

  • memory/1832-379-0x0000000004AE0000-0x0000000004B20000-memory.dmp

    Filesize

    256KB

  • memory/1832-381-0x0000000004AE0000-0x0000000004B20000-memory.dmp

    Filesize

    256KB

  • memory/1832-383-0x0000000004AE0000-0x0000000004B20000-memory.dmp

    Filesize

    256KB

  • memory/1832-919-0x0000000004AE0000-0x0000000004B20000-memory.dmp

    Filesize

    256KB

  • memory/1832-920-0x0000000000370000-0x00000000003B6000-memory.dmp

    Filesize

    280KB

  • memory/1832-922-0x0000000004AE0000-0x0000000004B20000-memory.dmp

    Filesize

    256KB

  • memory/1832-923-0x0000000004AE0000-0x0000000004B20000-memory.dmp

    Filesize

    256KB

  • memory/1832-924-0x0000000004AE0000-0x0000000004B20000-memory.dmp

    Filesize

    256KB

  • memory/1832-926-0x0000000004AE0000-0x0000000004B20000-memory.dmp

    Filesize

    256KB