Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:59

General

  • Target

    55ebd196a5ee54ae60c5bcd39d74261f12bd98766fc044e0115d579e90d642a5.exe

  • Size

    697KB

  • MD5

    3826041290ee2b583baf2b1857913090

  • SHA1

    fb111ff1db1398b95d159c9ade4ca02facac542e

  • SHA256

    55ebd196a5ee54ae60c5bcd39d74261f12bd98766fc044e0115d579e90d642a5

  • SHA512

    b473cb6901e94b6413edbd0c571b8d0f5ea0ae2dfa249dbbda3b2bf8d3c43d2ca36a62b77a8188c28f09f65504795a6c727f07006042b9288d0e61d3f61434de

  • SSDEEP

    12288:Cy90002mXgf80N8LqDG6FJ+sN7s202wQsZRhuTHw0iDTe7WBAItVn/cPr5Rnw:Cyp02mXq8u8LyG6FJDN1RwHjABoe7WBz

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55ebd196a5ee54ae60c5bcd39d74261f12bd98766fc044e0115d579e90d642a5.exe
    "C:\Users\Admin\AppData\Local\Temp\55ebd196a5ee54ae60c5bcd39d74261f12bd98766fc044e0115d579e90d642a5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un336907.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un336907.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\20999443.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\20999443.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk828671.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk828671.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1684

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un336907.exe

          Filesize

          543KB

          MD5

          5780bfd95c8f9179fe22acbe1fcc4525

          SHA1

          9c33c9b24d3b7d413e653c61e6c06d478ad41307

          SHA256

          7a448d0110926d6a2f75c31b6dd0f8b38c5496d3e645f356ca529a13cf693258

          SHA512

          050465269a54bfa9bf7494f0611e3052e97ad81952d0cb04c5750beb5bec3b9a4ff3eaf1caa650ddd3403fa2d549e5c0febd544d250b4455b8443bdf41409520

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un336907.exe

          Filesize

          543KB

          MD5

          5780bfd95c8f9179fe22acbe1fcc4525

          SHA1

          9c33c9b24d3b7d413e653c61e6c06d478ad41307

          SHA256

          7a448d0110926d6a2f75c31b6dd0f8b38c5496d3e645f356ca529a13cf693258

          SHA512

          050465269a54bfa9bf7494f0611e3052e97ad81952d0cb04c5750beb5bec3b9a4ff3eaf1caa650ddd3403fa2d549e5c0febd544d250b4455b8443bdf41409520

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\20999443.exe

          Filesize

          264KB

          MD5

          6d5e171121db6500a7cf6400396e442d

          SHA1

          7a919f33ccb281c2b283f515eaef641df6c7cdbc

          SHA256

          330660e3cd5b80a85708b98b8645258260598037598cd9c9ef43c0c50489f057

          SHA512

          157fe128a5ba1080737a6ccc79424925eea1a85a72a018b51165cb25fb9acdc72e5ddea7c6c97761c3fdb9d8771d22ec72793db38cdecf8bde1b233d6a700734

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\20999443.exe

          Filesize

          264KB

          MD5

          6d5e171121db6500a7cf6400396e442d

          SHA1

          7a919f33ccb281c2b283f515eaef641df6c7cdbc

          SHA256

          330660e3cd5b80a85708b98b8645258260598037598cd9c9ef43c0c50489f057

          SHA512

          157fe128a5ba1080737a6ccc79424925eea1a85a72a018b51165cb25fb9acdc72e5ddea7c6c97761c3fdb9d8771d22ec72793db38cdecf8bde1b233d6a700734

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\20999443.exe

          Filesize

          264KB

          MD5

          6d5e171121db6500a7cf6400396e442d

          SHA1

          7a919f33ccb281c2b283f515eaef641df6c7cdbc

          SHA256

          330660e3cd5b80a85708b98b8645258260598037598cd9c9ef43c0c50489f057

          SHA512

          157fe128a5ba1080737a6ccc79424925eea1a85a72a018b51165cb25fb9acdc72e5ddea7c6c97761c3fdb9d8771d22ec72793db38cdecf8bde1b233d6a700734

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk828671.exe

          Filesize

          348KB

          MD5

          4fd6e7c377f39350f18e69ec478f1cc2

          SHA1

          4b29b8e9ae0c9b4f45b60e994037a23cc288a267

          SHA256

          91b2dd3796094ee26bd41ce01bf15633af5c40c7adcf85ecf70cc2381dc34c47

          SHA512

          37de523097fda684fc34770059f638bbd380ad0edb338dced5c2d891eb83ff8517e2fa8814b0c589a31e25b77304ca9a60643774f6570ee29d2f8ba9b66bb4ee

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk828671.exe

          Filesize

          348KB

          MD5

          4fd6e7c377f39350f18e69ec478f1cc2

          SHA1

          4b29b8e9ae0c9b4f45b60e994037a23cc288a267

          SHA256

          91b2dd3796094ee26bd41ce01bf15633af5c40c7adcf85ecf70cc2381dc34c47

          SHA512

          37de523097fda684fc34770059f638bbd380ad0edb338dced5c2d891eb83ff8517e2fa8814b0c589a31e25b77304ca9a60643774f6570ee29d2f8ba9b66bb4ee

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk828671.exe

          Filesize

          348KB

          MD5

          4fd6e7c377f39350f18e69ec478f1cc2

          SHA1

          4b29b8e9ae0c9b4f45b60e994037a23cc288a267

          SHA256

          91b2dd3796094ee26bd41ce01bf15633af5c40c7adcf85ecf70cc2381dc34c47

          SHA512

          37de523097fda684fc34770059f638bbd380ad0edb338dced5c2d891eb83ff8517e2fa8814b0c589a31e25b77304ca9a60643774f6570ee29d2f8ba9b66bb4ee

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un336907.exe

          Filesize

          543KB

          MD5

          5780bfd95c8f9179fe22acbe1fcc4525

          SHA1

          9c33c9b24d3b7d413e653c61e6c06d478ad41307

          SHA256

          7a448d0110926d6a2f75c31b6dd0f8b38c5496d3e645f356ca529a13cf693258

          SHA512

          050465269a54bfa9bf7494f0611e3052e97ad81952d0cb04c5750beb5bec3b9a4ff3eaf1caa650ddd3403fa2d549e5c0febd544d250b4455b8443bdf41409520

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un336907.exe

          Filesize

          543KB

          MD5

          5780bfd95c8f9179fe22acbe1fcc4525

          SHA1

          9c33c9b24d3b7d413e653c61e6c06d478ad41307

          SHA256

          7a448d0110926d6a2f75c31b6dd0f8b38c5496d3e645f356ca529a13cf693258

          SHA512

          050465269a54bfa9bf7494f0611e3052e97ad81952d0cb04c5750beb5bec3b9a4ff3eaf1caa650ddd3403fa2d549e5c0febd544d250b4455b8443bdf41409520

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\20999443.exe

          Filesize

          264KB

          MD5

          6d5e171121db6500a7cf6400396e442d

          SHA1

          7a919f33ccb281c2b283f515eaef641df6c7cdbc

          SHA256

          330660e3cd5b80a85708b98b8645258260598037598cd9c9ef43c0c50489f057

          SHA512

          157fe128a5ba1080737a6ccc79424925eea1a85a72a018b51165cb25fb9acdc72e5ddea7c6c97761c3fdb9d8771d22ec72793db38cdecf8bde1b233d6a700734

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\20999443.exe

          Filesize

          264KB

          MD5

          6d5e171121db6500a7cf6400396e442d

          SHA1

          7a919f33ccb281c2b283f515eaef641df6c7cdbc

          SHA256

          330660e3cd5b80a85708b98b8645258260598037598cd9c9ef43c0c50489f057

          SHA512

          157fe128a5ba1080737a6ccc79424925eea1a85a72a018b51165cb25fb9acdc72e5ddea7c6c97761c3fdb9d8771d22ec72793db38cdecf8bde1b233d6a700734

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\20999443.exe

          Filesize

          264KB

          MD5

          6d5e171121db6500a7cf6400396e442d

          SHA1

          7a919f33ccb281c2b283f515eaef641df6c7cdbc

          SHA256

          330660e3cd5b80a85708b98b8645258260598037598cd9c9ef43c0c50489f057

          SHA512

          157fe128a5ba1080737a6ccc79424925eea1a85a72a018b51165cb25fb9acdc72e5ddea7c6c97761c3fdb9d8771d22ec72793db38cdecf8bde1b233d6a700734

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk828671.exe

          Filesize

          348KB

          MD5

          4fd6e7c377f39350f18e69ec478f1cc2

          SHA1

          4b29b8e9ae0c9b4f45b60e994037a23cc288a267

          SHA256

          91b2dd3796094ee26bd41ce01bf15633af5c40c7adcf85ecf70cc2381dc34c47

          SHA512

          37de523097fda684fc34770059f638bbd380ad0edb338dced5c2d891eb83ff8517e2fa8814b0c589a31e25b77304ca9a60643774f6570ee29d2f8ba9b66bb4ee

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk828671.exe

          Filesize

          348KB

          MD5

          4fd6e7c377f39350f18e69ec478f1cc2

          SHA1

          4b29b8e9ae0c9b4f45b60e994037a23cc288a267

          SHA256

          91b2dd3796094ee26bd41ce01bf15633af5c40c7adcf85ecf70cc2381dc34c47

          SHA512

          37de523097fda684fc34770059f638bbd380ad0edb338dced5c2d891eb83ff8517e2fa8814b0c589a31e25b77304ca9a60643774f6570ee29d2f8ba9b66bb4ee

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk828671.exe

          Filesize

          348KB

          MD5

          4fd6e7c377f39350f18e69ec478f1cc2

          SHA1

          4b29b8e9ae0c9b4f45b60e994037a23cc288a267

          SHA256

          91b2dd3796094ee26bd41ce01bf15633af5c40c7adcf85ecf70cc2381dc34c47

          SHA512

          37de523097fda684fc34770059f638bbd380ad0edb338dced5c2d891eb83ff8517e2fa8814b0c589a31e25b77304ca9a60643774f6570ee29d2f8ba9b66bb4ee

        • memory/1020-110-0x0000000000400000-0x0000000002B9D000-memory.dmp

          Filesize

          39.6MB

        • memory/1020-87-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-89-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-91-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-95-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-93-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-99-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-97-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-103-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-101-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-109-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-107-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-105-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-85-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-112-0x0000000000400000-0x0000000002B9D000-memory.dmp

          Filesize

          39.6MB

        • memory/1020-83-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-82-0x0000000002C20000-0x0000000002C33000-memory.dmp

          Filesize

          76KB

        • memory/1020-81-0x0000000002C20000-0x0000000002C38000-memory.dmp

          Filesize

          96KB

        • memory/1020-80-0x00000000072A0000-0x00000000072E0000-memory.dmp

          Filesize

          256KB

        • memory/1020-79-0x00000000003A0000-0x00000000003BA000-memory.dmp

          Filesize

          104KB

        • memory/1020-78-0x0000000000240000-0x000000000026D000-memory.dmp

          Filesize

          180KB

        • memory/1684-125-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-146-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-123-0x0000000004900000-0x000000000493C000-memory.dmp

          Filesize

          240KB

        • memory/1684-126-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-128-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-130-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-132-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-134-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-136-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-138-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-140-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-142-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-144-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-124-0x0000000004940000-0x000000000497A000-memory.dmp

          Filesize

          232KB

        • memory/1684-148-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-150-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-152-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-154-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-156-0x0000000004940000-0x0000000004975000-memory.dmp

          Filesize

          212KB

        • memory/1684-160-0x0000000000250000-0x0000000000296000-memory.dmp

          Filesize

          280KB

        • memory/1684-162-0x00000000049A0000-0x00000000049E0000-memory.dmp

          Filesize

          256KB

        • memory/1684-164-0x00000000049A0000-0x00000000049E0000-memory.dmp

          Filesize

          256KB

        • memory/1684-166-0x00000000049A0000-0x00000000049E0000-memory.dmp

          Filesize

          256KB

        • memory/1684-921-0x00000000049A0000-0x00000000049E0000-memory.dmp

          Filesize

          256KB

        • memory/1684-924-0x00000000049A0000-0x00000000049E0000-memory.dmp

          Filesize

          256KB