Analysis

  • max time kernel
    151s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:02

General

  • Target

    5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe

  • Size

    1.3MB

  • MD5

    24cca2a9f98862f05d8ec923d854eb41

  • SHA1

    81df5fb2dfbaf33eeb4c18d6c73bbf531c3434fd

  • SHA256

    5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e

  • SHA512

    79a7c41d16282a2ad9518b00ea15cc01c6aec40a727fa0154f221ce76783a72bbefd355b655f384d24591b253173284d46994d376c9fc51b549ec82461cdb96b

  • SSDEEP

    24576:cy5jD+g4kFvov3p8KuYWCI6T/vVoFLjnFjXp8Q8V:L1D4wc8G15TXVULj958r

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe
    "C:\Users\Admin\AppData\Local\Temp\5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4444086.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4444086.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7293975.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7293975.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9160507.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9160507.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1172
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7038952.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7038952.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:800
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o4266009.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o4266009.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4444086.exe

    Filesize

    1.1MB

    MD5

    a43ab70564a9e40c2702a509b1221f55

    SHA1

    09c616dcf57730b9bb13841bed1222fbadc98d53

    SHA256

    2cf46619372bb777845be8cb4a0f3cf2d94b2e178291e4fcbf6a1b37053a96c6

    SHA512

    856f26ac5efff6f3ec40fad2d10a4abc666fea5baf545c420ab105a7e53056e5026a5a12ccdda8aaa2f482b1cec8a11e7407740bf2f99d55085e6de6ec2cdd94

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4444086.exe

    Filesize

    1.1MB

    MD5

    a43ab70564a9e40c2702a509b1221f55

    SHA1

    09c616dcf57730b9bb13841bed1222fbadc98d53

    SHA256

    2cf46619372bb777845be8cb4a0f3cf2d94b2e178291e4fcbf6a1b37053a96c6

    SHA512

    856f26ac5efff6f3ec40fad2d10a4abc666fea5baf545c420ab105a7e53056e5026a5a12ccdda8aaa2f482b1cec8a11e7407740bf2f99d55085e6de6ec2cdd94

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7293975.exe

    Filesize

    621KB

    MD5

    0e52bbda4bcdce5df20eeced6f5d1186

    SHA1

    49565f71f1402ebb837896f3311d385a33b5c962

    SHA256

    e83d89d0d7af0725df81db3f6fdc91b75b5b47e1105bd05915e919b20770453a

    SHA512

    0430da20a3414f709ac23189295e3630d1040319aede912aebd29985e8960a640fbf60de76d293e1e99b8ac81d1a6f54d9b974726941455ee98d3b0cc906c790

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7293975.exe

    Filesize

    621KB

    MD5

    0e52bbda4bcdce5df20eeced6f5d1186

    SHA1

    49565f71f1402ebb837896f3311d385a33b5c962

    SHA256

    e83d89d0d7af0725df81db3f6fdc91b75b5b47e1105bd05915e919b20770453a

    SHA512

    0430da20a3414f709ac23189295e3630d1040319aede912aebd29985e8960a640fbf60de76d293e1e99b8ac81d1a6f54d9b974726941455ee98d3b0cc906c790

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9160507.exe

    Filesize

    418KB

    MD5

    5505dc17aef0302e4a219d55e1e54dc1

    SHA1

    6a91aecfd0b01659634db12169f6c641e08b56a7

    SHA256

    5955d38556600ea836e607056aca24d3ed7a76b3d8cd6cac77ffe01de729c71d

    SHA512

    973ee6d4b38823ffd314cdf00efe831f73b2b0bfb7a914108f3f2a984b2e6c52e59ddaba7efcc9f8b40dddf28bebd942b2aef9861a524e707afcee0326ec6442

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9160507.exe

    Filesize

    418KB

    MD5

    5505dc17aef0302e4a219d55e1e54dc1

    SHA1

    6a91aecfd0b01659634db12169f6c641e08b56a7

    SHA256

    5955d38556600ea836e607056aca24d3ed7a76b3d8cd6cac77ffe01de729c71d

    SHA512

    973ee6d4b38823ffd314cdf00efe831f73b2b0bfb7a914108f3f2a984b2e6c52e59ddaba7efcc9f8b40dddf28bebd942b2aef9861a524e707afcee0326ec6442

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7038952.exe

    Filesize

    361KB

    MD5

    66ac29b6015fe597178f3da153acafa5

    SHA1

    1a0bd3ae7936d9dafad10eccbecc84e0cc63efa4

    SHA256

    f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835

    SHA512

    f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7038952.exe

    Filesize

    361KB

    MD5

    66ac29b6015fe597178f3da153acafa5

    SHA1

    1a0bd3ae7936d9dafad10eccbecc84e0cc63efa4

    SHA256

    f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835

    SHA512

    f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7038952.exe

    Filesize

    361KB

    MD5

    66ac29b6015fe597178f3da153acafa5

    SHA1

    1a0bd3ae7936d9dafad10eccbecc84e0cc63efa4

    SHA256

    f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835

    SHA512

    f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o4266009.exe

    Filesize

    136KB

    MD5

    5c186f86d0a5301ce85ec29dd462d7ff

    SHA1

    d0ccfe81e46cc32dbba0df7a99fc19a8d663c3dd

    SHA256

    9eb56011cae5b1047459577149342310910bbb07dab8eebb4ad04e3c1ca3ac07

    SHA512

    b1772fbc4127fff6fc6f110aadd7b9ee59dcc6d8df28fcfcc4d290885041314d4e6e04b85e3c3c2921453363ff620513c65525b8cdb6ee630cbadddeac9613f8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o4266009.exe

    Filesize

    136KB

    MD5

    5c186f86d0a5301ce85ec29dd462d7ff

    SHA1

    d0ccfe81e46cc32dbba0df7a99fc19a8d663c3dd

    SHA256

    9eb56011cae5b1047459577149342310910bbb07dab8eebb4ad04e3c1ca3ac07

    SHA512

    b1772fbc4127fff6fc6f110aadd7b9ee59dcc6d8df28fcfcc4d290885041314d4e6e04b85e3c3c2921453363ff620513c65525b8cdb6ee630cbadddeac9613f8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4444086.exe

    Filesize

    1.1MB

    MD5

    a43ab70564a9e40c2702a509b1221f55

    SHA1

    09c616dcf57730b9bb13841bed1222fbadc98d53

    SHA256

    2cf46619372bb777845be8cb4a0f3cf2d94b2e178291e4fcbf6a1b37053a96c6

    SHA512

    856f26ac5efff6f3ec40fad2d10a4abc666fea5baf545c420ab105a7e53056e5026a5a12ccdda8aaa2f482b1cec8a11e7407740bf2f99d55085e6de6ec2cdd94

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4444086.exe

    Filesize

    1.1MB

    MD5

    a43ab70564a9e40c2702a509b1221f55

    SHA1

    09c616dcf57730b9bb13841bed1222fbadc98d53

    SHA256

    2cf46619372bb777845be8cb4a0f3cf2d94b2e178291e4fcbf6a1b37053a96c6

    SHA512

    856f26ac5efff6f3ec40fad2d10a4abc666fea5baf545c420ab105a7e53056e5026a5a12ccdda8aaa2f482b1cec8a11e7407740bf2f99d55085e6de6ec2cdd94

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7293975.exe

    Filesize

    621KB

    MD5

    0e52bbda4bcdce5df20eeced6f5d1186

    SHA1

    49565f71f1402ebb837896f3311d385a33b5c962

    SHA256

    e83d89d0d7af0725df81db3f6fdc91b75b5b47e1105bd05915e919b20770453a

    SHA512

    0430da20a3414f709ac23189295e3630d1040319aede912aebd29985e8960a640fbf60de76d293e1e99b8ac81d1a6f54d9b974726941455ee98d3b0cc906c790

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7293975.exe

    Filesize

    621KB

    MD5

    0e52bbda4bcdce5df20eeced6f5d1186

    SHA1

    49565f71f1402ebb837896f3311d385a33b5c962

    SHA256

    e83d89d0d7af0725df81db3f6fdc91b75b5b47e1105bd05915e919b20770453a

    SHA512

    0430da20a3414f709ac23189295e3630d1040319aede912aebd29985e8960a640fbf60de76d293e1e99b8ac81d1a6f54d9b974726941455ee98d3b0cc906c790

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9160507.exe

    Filesize

    418KB

    MD5

    5505dc17aef0302e4a219d55e1e54dc1

    SHA1

    6a91aecfd0b01659634db12169f6c641e08b56a7

    SHA256

    5955d38556600ea836e607056aca24d3ed7a76b3d8cd6cac77ffe01de729c71d

    SHA512

    973ee6d4b38823ffd314cdf00efe831f73b2b0bfb7a914108f3f2a984b2e6c52e59ddaba7efcc9f8b40dddf28bebd942b2aef9861a524e707afcee0326ec6442

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9160507.exe

    Filesize

    418KB

    MD5

    5505dc17aef0302e4a219d55e1e54dc1

    SHA1

    6a91aecfd0b01659634db12169f6c641e08b56a7

    SHA256

    5955d38556600ea836e607056aca24d3ed7a76b3d8cd6cac77ffe01de729c71d

    SHA512

    973ee6d4b38823ffd314cdf00efe831f73b2b0bfb7a914108f3f2a984b2e6c52e59ddaba7efcc9f8b40dddf28bebd942b2aef9861a524e707afcee0326ec6442

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n7038952.exe

    Filesize

    361KB

    MD5

    66ac29b6015fe597178f3da153acafa5

    SHA1

    1a0bd3ae7936d9dafad10eccbecc84e0cc63efa4

    SHA256

    f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835

    SHA512

    f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n7038952.exe

    Filesize

    361KB

    MD5

    66ac29b6015fe597178f3da153acafa5

    SHA1

    1a0bd3ae7936d9dafad10eccbecc84e0cc63efa4

    SHA256

    f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835

    SHA512

    f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n7038952.exe

    Filesize

    361KB

    MD5

    66ac29b6015fe597178f3da153acafa5

    SHA1

    1a0bd3ae7936d9dafad10eccbecc84e0cc63efa4

    SHA256

    f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835

    SHA512

    f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o4266009.exe

    Filesize

    136KB

    MD5

    5c186f86d0a5301ce85ec29dd462d7ff

    SHA1

    d0ccfe81e46cc32dbba0df7a99fc19a8d663c3dd

    SHA256

    9eb56011cae5b1047459577149342310910bbb07dab8eebb4ad04e3c1ca3ac07

    SHA512

    b1772fbc4127fff6fc6f110aadd7b9ee59dcc6d8df28fcfcc4d290885041314d4e6e04b85e3c3c2921453363ff620513c65525b8cdb6ee630cbadddeac9613f8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o4266009.exe

    Filesize

    136KB

    MD5

    5c186f86d0a5301ce85ec29dd462d7ff

    SHA1

    d0ccfe81e46cc32dbba0df7a99fc19a8d663c3dd

    SHA256

    9eb56011cae5b1047459577149342310910bbb07dab8eebb4ad04e3c1ca3ac07

    SHA512

    b1772fbc4127fff6fc6f110aadd7b9ee59dcc6d8df28fcfcc4d290885041314d4e6e04b85e3c3c2921453363ff620513c65525b8cdb6ee630cbadddeac9613f8

  • memory/800-104-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-126-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-102-0x0000000000B90000-0x0000000000BA8000-memory.dmp

    Filesize

    96KB

  • memory/800-106-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-108-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-110-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-112-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-114-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-116-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-118-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-120-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-122-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-124-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-103-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-128-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-130-0x0000000000B90000-0x0000000000BA2000-memory.dmp

    Filesize

    72KB

  • memory/800-131-0x0000000004DC0000-0x0000000004E00000-memory.dmp

    Filesize

    256KB

  • memory/800-132-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/800-134-0x0000000004DC0000-0x0000000004E00000-memory.dmp

    Filesize

    256KB

  • memory/800-137-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/800-101-0x0000000004DC0000-0x0000000004E00000-memory.dmp

    Filesize

    256KB

  • memory/800-100-0x0000000004DC0000-0x0000000004E00000-memory.dmp

    Filesize

    256KB

  • memory/800-99-0x00000000007E0000-0x00000000007FA000-memory.dmp

    Filesize

    104KB

  • memory/800-98-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/1908-144-0x0000000000D70000-0x0000000000D98000-memory.dmp

    Filesize

    160KB

  • memory/1908-145-0x0000000007060000-0x00000000070A0000-memory.dmp

    Filesize

    256KB

  • memory/1908-146-0x0000000007060000-0x00000000070A0000-memory.dmp

    Filesize

    256KB