Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:40

General

  • Target

    472fc487282dc1b3802fd2cccb9ada52b683f95a541435095d3f744716c68186.exe

  • Size

    1.5MB

  • MD5

    247613f4bdd4077a49ad4bb24bad44e7

  • SHA1

    67cfa7eb4f078bf8caf31ba045abaadcb495dc34

  • SHA256

    472fc487282dc1b3802fd2cccb9ada52b683f95a541435095d3f744716c68186

  • SHA512

    46ccb8527b33699bc915ea8ea409743ee514566087cf7d9c867b7f51601d2f7d27e0dd21f7c732a8f482623f5e9e701ab467bab0d336ab736b719847457da3b5

  • SSDEEP

    24576:Hy2pda8yJk9u1RLJNGtowsAYNoXSwIZw2ZWTz9bJKxRY1vNSa50ToKuVa:SJ8yJx1PNGqws2XS3JUTzrvNSaWoX

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\472fc487282dc1b3802fd2cccb9ada52b683f95a541435095d3f744716c68186.exe
    "C:\Users\Admin\AppData\Local\Temp\472fc487282dc1b3802fd2cccb9ada52b683f95a541435095d3f744716c68186.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8775234.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8775234.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8227872.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8227872.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1104
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9548529.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9548529.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:552
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3337066.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3337066.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2032
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5270149.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5270149.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1640
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9429037.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9429037.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1356

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8775234.exe

          Filesize

          1.4MB

          MD5

          9165a37e4fba4f9d90d7897bb7ff083b

          SHA1

          a76c94d05bdef58ead415d4fc9157045ac9b3448

          SHA256

          7947476413b90954be5f346859ef81e78b3aa721dfb8c596365a90954503db6e

          SHA512

          7a52ea96fc066d11a90960a45427587bb48043cb14f4734a1231a6521d12d610e906d6e2e1ca6cb115d7d9ed3fed0bd3fee1ad1c1ab3cd66356f17075980fb89

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8775234.exe

          Filesize

          1.4MB

          MD5

          9165a37e4fba4f9d90d7897bb7ff083b

          SHA1

          a76c94d05bdef58ead415d4fc9157045ac9b3448

          SHA256

          7947476413b90954be5f346859ef81e78b3aa721dfb8c596365a90954503db6e

          SHA512

          7a52ea96fc066d11a90960a45427587bb48043cb14f4734a1231a6521d12d610e906d6e2e1ca6cb115d7d9ed3fed0bd3fee1ad1c1ab3cd66356f17075980fb89

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8227872.exe

          Filesize

          912KB

          MD5

          22d13b5f9d4ae0fe8aba2bd412b5f185

          SHA1

          4b4c4d8b9e8a50cf18c3977542b821e2f4ecabe9

          SHA256

          c2e24e954a0b595c6dea6d3e3d3af38e66b8cb0a22ff777b8cae50737376a957

          SHA512

          8480bc4d5b0e332e56b7d0da1b9d3a774ec2e6657c16be28e8a50f53ac77b9486961e07d039e7f7ed2797e536f72a9e926a4c66e81fe33e8701beeebe22bb60a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8227872.exe

          Filesize

          912KB

          MD5

          22d13b5f9d4ae0fe8aba2bd412b5f185

          SHA1

          4b4c4d8b9e8a50cf18c3977542b821e2f4ecabe9

          SHA256

          c2e24e954a0b595c6dea6d3e3d3af38e66b8cb0a22ff777b8cae50737376a957

          SHA512

          8480bc4d5b0e332e56b7d0da1b9d3a774ec2e6657c16be28e8a50f53ac77b9486961e07d039e7f7ed2797e536f72a9e926a4c66e81fe33e8701beeebe22bb60a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9548529.exe

          Filesize

          707KB

          MD5

          39dad8ac7d85fe4d8dbad295a2b58350

          SHA1

          f930cb870951847f809b57c5bf4558e02d6231f8

          SHA256

          aa5a6f4fe78c05837b536e111853f0b311b1bbcd2fb3271b32e2ca9b3116c497

          SHA512

          c4c4029d141410cfbadf2dc22b651cf8ee0df9f4d98c317f13f9e8b846c1c0b0a65a7f9f2af785d00b6f04a67f84b38d39338dd69ecc46236504043adf6266e2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9548529.exe

          Filesize

          707KB

          MD5

          39dad8ac7d85fe4d8dbad295a2b58350

          SHA1

          f930cb870951847f809b57c5bf4558e02d6231f8

          SHA256

          aa5a6f4fe78c05837b536e111853f0b311b1bbcd2fb3271b32e2ca9b3116c497

          SHA512

          c4c4029d141410cfbadf2dc22b651cf8ee0df9f4d98c317f13f9e8b846c1c0b0a65a7f9f2af785d00b6f04a67f84b38d39338dd69ecc46236504043adf6266e2

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3337066.exe

          Filesize

          416KB

          MD5

          9eaa01d7ef7e024c5d16868683c043c5

          SHA1

          143c30e08f37e63a062cade9e9d1cee1ea62fd6e

          SHA256

          ad051eca02a47c8124959e682ce24376008c6f2c2176d423851836172bae6d63

          SHA512

          790c31883b7137418dca5fb535f5c8ca41739df7810a08999e3a94831fdd452f1189aa33eae7d49149e91e1939018afae0a08b9be6b976fcceb2e24658973b03

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3337066.exe

          Filesize

          416KB

          MD5

          9eaa01d7ef7e024c5d16868683c043c5

          SHA1

          143c30e08f37e63a062cade9e9d1cee1ea62fd6e

          SHA256

          ad051eca02a47c8124959e682ce24376008c6f2c2176d423851836172bae6d63

          SHA512

          790c31883b7137418dca5fb535f5c8ca41739df7810a08999e3a94831fdd452f1189aa33eae7d49149e91e1939018afae0a08b9be6b976fcceb2e24658973b03

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5270149.exe

          Filesize

          360KB

          MD5

          a824c65bb888d4c1513e2799ee9a7950

          SHA1

          782e16423143552ad273f95ac6701f758384f694

          SHA256

          ba38f28ada2c5625dc61cfcc877da7e1994b3015799e5579954c88c5145de0f2

          SHA512

          5ea6e038ef93e9b2ceac5b06da119bf1b8d91fc6495637fce39efa3f2b504cbb83cd995530eea3f549e567318bcbcf73c84c1022187a7b6315b620e97b5cca18

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5270149.exe

          Filesize

          360KB

          MD5

          a824c65bb888d4c1513e2799ee9a7950

          SHA1

          782e16423143552ad273f95ac6701f758384f694

          SHA256

          ba38f28ada2c5625dc61cfcc877da7e1994b3015799e5579954c88c5145de0f2

          SHA512

          5ea6e038ef93e9b2ceac5b06da119bf1b8d91fc6495637fce39efa3f2b504cbb83cd995530eea3f549e567318bcbcf73c84c1022187a7b6315b620e97b5cca18

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5270149.exe

          Filesize

          360KB

          MD5

          a824c65bb888d4c1513e2799ee9a7950

          SHA1

          782e16423143552ad273f95ac6701f758384f694

          SHA256

          ba38f28ada2c5625dc61cfcc877da7e1994b3015799e5579954c88c5145de0f2

          SHA512

          5ea6e038ef93e9b2ceac5b06da119bf1b8d91fc6495637fce39efa3f2b504cbb83cd995530eea3f549e567318bcbcf73c84c1022187a7b6315b620e97b5cca18

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9429037.exe

          Filesize

          136KB

          MD5

          152bbb5c4a136530bf379d453ba9d11b

          SHA1

          652d2dcbf33180a02df4e71a71660bc69be34be2

          SHA256

          6b21571a73baa8da6614f160606afcfc02926f2c5ddec647d9b62a371ae4554c

          SHA512

          1e2f3fcf1bb174975714aa1eee9fad942fc43aa420ed25f0db93733dea184bad061291cfd208dd3882e017b39565fe6d21b68ba2832f233d25a4186e9b89cecd

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9429037.exe

          Filesize

          136KB

          MD5

          152bbb5c4a136530bf379d453ba9d11b

          SHA1

          652d2dcbf33180a02df4e71a71660bc69be34be2

          SHA256

          6b21571a73baa8da6614f160606afcfc02926f2c5ddec647d9b62a371ae4554c

          SHA512

          1e2f3fcf1bb174975714aa1eee9fad942fc43aa420ed25f0db93733dea184bad061291cfd208dd3882e017b39565fe6d21b68ba2832f233d25a4186e9b89cecd

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8775234.exe

          Filesize

          1.4MB

          MD5

          9165a37e4fba4f9d90d7897bb7ff083b

          SHA1

          a76c94d05bdef58ead415d4fc9157045ac9b3448

          SHA256

          7947476413b90954be5f346859ef81e78b3aa721dfb8c596365a90954503db6e

          SHA512

          7a52ea96fc066d11a90960a45427587bb48043cb14f4734a1231a6521d12d610e906d6e2e1ca6cb115d7d9ed3fed0bd3fee1ad1c1ab3cd66356f17075980fb89

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8775234.exe

          Filesize

          1.4MB

          MD5

          9165a37e4fba4f9d90d7897bb7ff083b

          SHA1

          a76c94d05bdef58ead415d4fc9157045ac9b3448

          SHA256

          7947476413b90954be5f346859ef81e78b3aa721dfb8c596365a90954503db6e

          SHA512

          7a52ea96fc066d11a90960a45427587bb48043cb14f4734a1231a6521d12d610e906d6e2e1ca6cb115d7d9ed3fed0bd3fee1ad1c1ab3cd66356f17075980fb89

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8227872.exe

          Filesize

          912KB

          MD5

          22d13b5f9d4ae0fe8aba2bd412b5f185

          SHA1

          4b4c4d8b9e8a50cf18c3977542b821e2f4ecabe9

          SHA256

          c2e24e954a0b595c6dea6d3e3d3af38e66b8cb0a22ff777b8cae50737376a957

          SHA512

          8480bc4d5b0e332e56b7d0da1b9d3a774ec2e6657c16be28e8a50f53ac77b9486961e07d039e7f7ed2797e536f72a9e926a4c66e81fe33e8701beeebe22bb60a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8227872.exe

          Filesize

          912KB

          MD5

          22d13b5f9d4ae0fe8aba2bd412b5f185

          SHA1

          4b4c4d8b9e8a50cf18c3977542b821e2f4ecabe9

          SHA256

          c2e24e954a0b595c6dea6d3e3d3af38e66b8cb0a22ff777b8cae50737376a957

          SHA512

          8480bc4d5b0e332e56b7d0da1b9d3a774ec2e6657c16be28e8a50f53ac77b9486961e07d039e7f7ed2797e536f72a9e926a4c66e81fe33e8701beeebe22bb60a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9548529.exe

          Filesize

          707KB

          MD5

          39dad8ac7d85fe4d8dbad295a2b58350

          SHA1

          f930cb870951847f809b57c5bf4558e02d6231f8

          SHA256

          aa5a6f4fe78c05837b536e111853f0b311b1bbcd2fb3271b32e2ca9b3116c497

          SHA512

          c4c4029d141410cfbadf2dc22b651cf8ee0df9f4d98c317f13f9e8b846c1c0b0a65a7f9f2af785d00b6f04a67f84b38d39338dd69ecc46236504043adf6266e2

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9548529.exe

          Filesize

          707KB

          MD5

          39dad8ac7d85fe4d8dbad295a2b58350

          SHA1

          f930cb870951847f809b57c5bf4558e02d6231f8

          SHA256

          aa5a6f4fe78c05837b536e111853f0b311b1bbcd2fb3271b32e2ca9b3116c497

          SHA512

          c4c4029d141410cfbadf2dc22b651cf8ee0df9f4d98c317f13f9e8b846c1c0b0a65a7f9f2af785d00b6f04a67f84b38d39338dd69ecc46236504043adf6266e2

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v3337066.exe

          Filesize

          416KB

          MD5

          9eaa01d7ef7e024c5d16868683c043c5

          SHA1

          143c30e08f37e63a062cade9e9d1cee1ea62fd6e

          SHA256

          ad051eca02a47c8124959e682ce24376008c6f2c2176d423851836172bae6d63

          SHA512

          790c31883b7137418dca5fb535f5c8ca41739df7810a08999e3a94831fdd452f1189aa33eae7d49149e91e1939018afae0a08b9be6b976fcceb2e24658973b03

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v3337066.exe

          Filesize

          416KB

          MD5

          9eaa01d7ef7e024c5d16868683c043c5

          SHA1

          143c30e08f37e63a062cade9e9d1cee1ea62fd6e

          SHA256

          ad051eca02a47c8124959e682ce24376008c6f2c2176d423851836172bae6d63

          SHA512

          790c31883b7137418dca5fb535f5c8ca41739df7810a08999e3a94831fdd452f1189aa33eae7d49149e91e1939018afae0a08b9be6b976fcceb2e24658973b03

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5270149.exe

          Filesize

          360KB

          MD5

          a824c65bb888d4c1513e2799ee9a7950

          SHA1

          782e16423143552ad273f95ac6701f758384f694

          SHA256

          ba38f28ada2c5625dc61cfcc877da7e1994b3015799e5579954c88c5145de0f2

          SHA512

          5ea6e038ef93e9b2ceac5b06da119bf1b8d91fc6495637fce39efa3f2b504cbb83cd995530eea3f549e567318bcbcf73c84c1022187a7b6315b620e97b5cca18

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5270149.exe

          Filesize

          360KB

          MD5

          a824c65bb888d4c1513e2799ee9a7950

          SHA1

          782e16423143552ad273f95ac6701f758384f694

          SHA256

          ba38f28ada2c5625dc61cfcc877da7e1994b3015799e5579954c88c5145de0f2

          SHA512

          5ea6e038ef93e9b2ceac5b06da119bf1b8d91fc6495637fce39efa3f2b504cbb83cd995530eea3f549e567318bcbcf73c84c1022187a7b6315b620e97b5cca18

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5270149.exe

          Filesize

          360KB

          MD5

          a824c65bb888d4c1513e2799ee9a7950

          SHA1

          782e16423143552ad273f95ac6701f758384f694

          SHA256

          ba38f28ada2c5625dc61cfcc877da7e1994b3015799e5579954c88c5145de0f2

          SHA512

          5ea6e038ef93e9b2ceac5b06da119bf1b8d91fc6495637fce39efa3f2b504cbb83cd995530eea3f549e567318bcbcf73c84c1022187a7b6315b620e97b5cca18

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b9429037.exe

          Filesize

          136KB

          MD5

          152bbb5c4a136530bf379d453ba9d11b

          SHA1

          652d2dcbf33180a02df4e71a71660bc69be34be2

          SHA256

          6b21571a73baa8da6614f160606afcfc02926f2c5ddec647d9b62a371ae4554c

          SHA512

          1e2f3fcf1bb174975714aa1eee9fad942fc43aa420ed25f0db93733dea184bad061291cfd208dd3882e017b39565fe6d21b68ba2832f233d25a4186e9b89cecd

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b9429037.exe

          Filesize

          136KB

          MD5

          152bbb5c4a136530bf379d453ba9d11b

          SHA1

          652d2dcbf33180a02df4e71a71660bc69be34be2

          SHA256

          6b21571a73baa8da6614f160606afcfc02926f2c5ddec647d9b62a371ae4554c

          SHA512

          1e2f3fcf1bb174975714aa1eee9fad942fc43aa420ed25f0db93733dea184bad061291cfd208dd3882e017b39565fe6d21b68ba2832f233d25a4186e9b89cecd

        • memory/1356-154-0x0000000004630000-0x0000000004670000-memory.dmp

          Filesize

          256KB

        • memory/1356-153-0x0000000004630000-0x0000000004670000-memory.dmp

          Filesize

          256KB

        • memory/1356-152-0x00000000000D0000-0x00000000000F8000-memory.dmp

          Filesize

          160KB

        • memory/1640-113-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-121-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-123-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-125-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-127-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-129-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-131-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-133-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-135-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-137-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-138-0x0000000000240000-0x000000000026D000-memory.dmp

          Filesize

          180KB

        • memory/1640-139-0x0000000004E10000-0x0000000004E50000-memory.dmp

          Filesize

          256KB

        • memory/1640-140-0x0000000004E10000-0x0000000004E50000-memory.dmp

          Filesize

          256KB

        • memory/1640-141-0x0000000000400000-0x00000000006F4000-memory.dmp

          Filesize

          3.0MB

        • memory/1640-142-0x0000000004E10000-0x0000000004E50000-memory.dmp

          Filesize

          256KB

        • memory/1640-145-0x0000000000400000-0x00000000006F4000-memory.dmp

          Filesize

          3.0MB

        • memory/1640-119-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-117-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-115-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-111-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-110-0x0000000000890000-0x00000000008A2000-memory.dmp

          Filesize

          72KB

        • memory/1640-109-0x0000000000890000-0x00000000008A8000-memory.dmp

          Filesize

          96KB

        • memory/1640-108-0x0000000000740000-0x000000000075A000-memory.dmp

          Filesize

          104KB