Analysis

  • max time kernel
    170s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 21:40

General

  • Target

    47745fa6026a709c71ad3ffbf1e404c1598306a4a031a2f385b7f53e22f500d0.exe

  • Size

    694KB

  • MD5

    b6160d67aab15d75a602b9cac3b7c7fe

  • SHA1

    2e85322a09d42a538f3e0380e55b2371b7fb1db0

  • SHA256

    47745fa6026a709c71ad3ffbf1e404c1598306a4a031a2f385b7f53e22f500d0

  • SHA512

    f103a4c35eb631c5a807ad618d25cb69c06e5e62ea5a9131fe0c375a88bcf36b48c7a7554a50dc35a233e6d59823a552ef8051bb93b0ae999d666389714cb81d

  • SSDEEP

    12288:/y90srkzrCNmwfq1HfzcDtDLFoLlcqEZnQ29CeW+iWgK4ZRPOOm:/y/rkzQAfwDDoxczQuCeQW74ZRPA

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47745fa6026a709c71ad3ffbf1e404c1598306a4a031a2f385b7f53e22f500d0.exe
    "C:\Users\Admin\AppData\Local\Temp\47745fa6026a709c71ad3ffbf1e404c1598306a4a031a2f385b7f53e22f500d0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un335493.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un335493.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36982697.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36982697.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk192330.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk192330.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un335493.exe

    Filesize

    540KB

    MD5

    e2452401c5f229f185a568636fb0699c

    SHA1

    9f0ca477d01e568e2f089ac0e689cf4138f8681c

    SHA256

    f579c03051e0dcbb58b97318b567b060d592f2e3a1d7e98b1b9552fd9fac4f92

    SHA512

    4dec640efd87e4da241c6677a6204ca77c099d0841ec0aa30cf331cc018138369eff7745cf5634c8d42b3dcd498de49aa9d32ecde25598802e80bccf99a5fbc0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un335493.exe

    Filesize

    540KB

    MD5

    e2452401c5f229f185a568636fb0699c

    SHA1

    9f0ca477d01e568e2f089ac0e689cf4138f8681c

    SHA256

    f579c03051e0dcbb58b97318b567b060d592f2e3a1d7e98b1b9552fd9fac4f92

    SHA512

    4dec640efd87e4da241c6677a6204ca77c099d0841ec0aa30cf331cc018138369eff7745cf5634c8d42b3dcd498de49aa9d32ecde25598802e80bccf99a5fbc0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36982697.exe

    Filesize

    258KB

    MD5

    c4d10514373b337fe6800db163cf9868

    SHA1

    edcd8b16e3fc79eee83cf67be0d02abc6bc921cd

    SHA256

    8df3ffbe9bef2eeb69037844adbe92de587e8c53049aa6c24c5d0e44dfe45d60

    SHA512

    5ce3eb1f66926bf515afd24efba3028823bb1c17bc4456d484cdf815f29142c1a31d5e2118fe65e57dd0fd0de12d2f338f0f559d4b524a381e84f7a8f20d7cad

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36982697.exe

    Filesize

    258KB

    MD5

    c4d10514373b337fe6800db163cf9868

    SHA1

    edcd8b16e3fc79eee83cf67be0d02abc6bc921cd

    SHA256

    8df3ffbe9bef2eeb69037844adbe92de587e8c53049aa6c24c5d0e44dfe45d60

    SHA512

    5ce3eb1f66926bf515afd24efba3028823bb1c17bc4456d484cdf815f29142c1a31d5e2118fe65e57dd0fd0de12d2f338f0f559d4b524a381e84f7a8f20d7cad

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36982697.exe

    Filesize

    258KB

    MD5

    c4d10514373b337fe6800db163cf9868

    SHA1

    edcd8b16e3fc79eee83cf67be0d02abc6bc921cd

    SHA256

    8df3ffbe9bef2eeb69037844adbe92de587e8c53049aa6c24c5d0e44dfe45d60

    SHA512

    5ce3eb1f66926bf515afd24efba3028823bb1c17bc4456d484cdf815f29142c1a31d5e2118fe65e57dd0fd0de12d2f338f0f559d4b524a381e84f7a8f20d7cad

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk192330.exe

    Filesize

    341KB

    MD5

    dbf4c42f588d74dd50fe4379b8523e39

    SHA1

    001aa6ac79964dadacf5764a2ad060809bfff6ce

    SHA256

    b27ce64fbb91e6ece84f5eb9fb46014cac7d8f594d5d88ed07fb4db3ef82ba95

    SHA512

    6980b798a90e06a71f12f0119701887268f7d1ddafc6782253dea563b56518609e1537aeac3450188a94eb3b7122905b340de72a64b0225ba24d754f588e700e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk192330.exe

    Filesize

    341KB

    MD5

    dbf4c42f588d74dd50fe4379b8523e39

    SHA1

    001aa6ac79964dadacf5764a2ad060809bfff6ce

    SHA256

    b27ce64fbb91e6ece84f5eb9fb46014cac7d8f594d5d88ed07fb4db3ef82ba95

    SHA512

    6980b798a90e06a71f12f0119701887268f7d1ddafc6782253dea563b56518609e1537aeac3450188a94eb3b7122905b340de72a64b0225ba24d754f588e700e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk192330.exe

    Filesize

    341KB

    MD5

    dbf4c42f588d74dd50fe4379b8523e39

    SHA1

    001aa6ac79964dadacf5764a2ad060809bfff6ce

    SHA256

    b27ce64fbb91e6ece84f5eb9fb46014cac7d8f594d5d88ed07fb4db3ef82ba95

    SHA512

    6980b798a90e06a71f12f0119701887268f7d1ddafc6782253dea563b56518609e1537aeac3450188a94eb3b7122905b340de72a64b0225ba24d754f588e700e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un335493.exe

    Filesize

    540KB

    MD5

    e2452401c5f229f185a568636fb0699c

    SHA1

    9f0ca477d01e568e2f089ac0e689cf4138f8681c

    SHA256

    f579c03051e0dcbb58b97318b567b060d592f2e3a1d7e98b1b9552fd9fac4f92

    SHA512

    4dec640efd87e4da241c6677a6204ca77c099d0841ec0aa30cf331cc018138369eff7745cf5634c8d42b3dcd498de49aa9d32ecde25598802e80bccf99a5fbc0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un335493.exe

    Filesize

    540KB

    MD5

    e2452401c5f229f185a568636fb0699c

    SHA1

    9f0ca477d01e568e2f089ac0e689cf4138f8681c

    SHA256

    f579c03051e0dcbb58b97318b567b060d592f2e3a1d7e98b1b9552fd9fac4f92

    SHA512

    4dec640efd87e4da241c6677a6204ca77c099d0841ec0aa30cf331cc018138369eff7745cf5634c8d42b3dcd498de49aa9d32ecde25598802e80bccf99a5fbc0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\36982697.exe

    Filesize

    258KB

    MD5

    c4d10514373b337fe6800db163cf9868

    SHA1

    edcd8b16e3fc79eee83cf67be0d02abc6bc921cd

    SHA256

    8df3ffbe9bef2eeb69037844adbe92de587e8c53049aa6c24c5d0e44dfe45d60

    SHA512

    5ce3eb1f66926bf515afd24efba3028823bb1c17bc4456d484cdf815f29142c1a31d5e2118fe65e57dd0fd0de12d2f338f0f559d4b524a381e84f7a8f20d7cad

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\36982697.exe

    Filesize

    258KB

    MD5

    c4d10514373b337fe6800db163cf9868

    SHA1

    edcd8b16e3fc79eee83cf67be0d02abc6bc921cd

    SHA256

    8df3ffbe9bef2eeb69037844adbe92de587e8c53049aa6c24c5d0e44dfe45d60

    SHA512

    5ce3eb1f66926bf515afd24efba3028823bb1c17bc4456d484cdf815f29142c1a31d5e2118fe65e57dd0fd0de12d2f338f0f559d4b524a381e84f7a8f20d7cad

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\36982697.exe

    Filesize

    258KB

    MD5

    c4d10514373b337fe6800db163cf9868

    SHA1

    edcd8b16e3fc79eee83cf67be0d02abc6bc921cd

    SHA256

    8df3ffbe9bef2eeb69037844adbe92de587e8c53049aa6c24c5d0e44dfe45d60

    SHA512

    5ce3eb1f66926bf515afd24efba3028823bb1c17bc4456d484cdf815f29142c1a31d5e2118fe65e57dd0fd0de12d2f338f0f559d4b524a381e84f7a8f20d7cad

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk192330.exe

    Filesize

    341KB

    MD5

    dbf4c42f588d74dd50fe4379b8523e39

    SHA1

    001aa6ac79964dadacf5764a2ad060809bfff6ce

    SHA256

    b27ce64fbb91e6ece84f5eb9fb46014cac7d8f594d5d88ed07fb4db3ef82ba95

    SHA512

    6980b798a90e06a71f12f0119701887268f7d1ddafc6782253dea563b56518609e1537aeac3450188a94eb3b7122905b340de72a64b0225ba24d754f588e700e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk192330.exe

    Filesize

    341KB

    MD5

    dbf4c42f588d74dd50fe4379b8523e39

    SHA1

    001aa6ac79964dadacf5764a2ad060809bfff6ce

    SHA256

    b27ce64fbb91e6ece84f5eb9fb46014cac7d8f594d5d88ed07fb4db3ef82ba95

    SHA512

    6980b798a90e06a71f12f0119701887268f7d1ddafc6782253dea563b56518609e1537aeac3450188a94eb3b7122905b340de72a64b0225ba24d754f588e700e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk192330.exe

    Filesize

    341KB

    MD5

    dbf4c42f588d74dd50fe4379b8523e39

    SHA1

    001aa6ac79964dadacf5764a2ad060809bfff6ce

    SHA256

    b27ce64fbb91e6ece84f5eb9fb46014cac7d8f594d5d88ed07fb4db3ef82ba95

    SHA512

    6980b798a90e06a71f12f0119701887268f7d1ddafc6782253dea563b56518609e1537aeac3450188a94eb3b7122905b340de72a64b0225ba24d754f588e700e

  • memory/296-87-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-89-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-91-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-95-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-93-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-99-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-97-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-103-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-101-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-107-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-105-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-108-0x00000000002A0000-0x00000000002CD000-memory.dmp

    Filesize

    180KB

  • memory/296-109-0x0000000007120000-0x0000000007160000-memory.dmp

    Filesize

    256KB

  • memory/296-110-0x0000000007120000-0x0000000007160000-memory.dmp

    Filesize

    256KB

  • memory/296-111-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/296-112-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/296-85-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-83-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-80-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-81-0x0000000004870000-0x0000000004883000-memory.dmp

    Filesize

    76KB

  • memory/296-79-0x0000000004870000-0x0000000004888000-memory.dmp

    Filesize

    96KB

  • memory/296-78-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/1644-126-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-145-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-125-0x0000000004B80000-0x0000000004BBA000-memory.dmp

    Filesize

    232KB

  • memory/1644-123-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/1644-127-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-129-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-131-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-133-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-137-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-135-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-139-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-141-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-143-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-124-0x0000000003370000-0x00000000033AC000-memory.dmp

    Filesize

    240KB

  • memory/1644-147-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-149-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-151-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-153-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-155-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-157-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-159-0x0000000004B80000-0x0000000004BB5000-memory.dmp

    Filesize

    212KB

  • memory/1644-443-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/1644-445-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/1644-920-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/1644-923-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/1644-924-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/1644-925-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/1644-926-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB