Analysis

  • max time kernel
    151s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 22:04

General

  • Target

    5a27523c66e350af5eb8b00c810551000d33776401848b7d8a51495fed7d17fa.exe

  • Size

    704KB

  • MD5

    6b87d296b21dae3b099cc25936aa0e0d

  • SHA1

    812c82a464c8fdc7fc2e049cde2597d269783d20

  • SHA256

    5a27523c66e350af5eb8b00c810551000d33776401848b7d8a51495fed7d17fa

  • SHA512

    9b16d51fe2b45831d56e8df8937c44eaebbcf162b91f311abd8974fb18e4dc5ea036c0901de19b1112ddf34ed73d27d1bee303fcde5fdbf16bf960e466b8d453

  • SSDEEP

    12288:Wy90X0hsfPYmJDJY23T91HGrDmBO7MDLCgKnI1IzCGLIztMCx/KL6iwZyn:WyphsYm28B1mrOO7OWEU/LIJJ9n8

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a27523c66e350af5eb8b00c810551000d33776401848b7d8a51495fed7d17fa.exe
    "C:\Users\Admin\AppData\Local\Temp\5a27523c66e350af5eb8b00c810551000d33776401848b7d8a51495fed7d17fa.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un084612.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un084612.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un084612.exe

    Filesize

    550KB

    MD5

    90b10c0e296ef2dc0bda455b428776bf

    SHA1

    6fee97a53515717bed3df128bb164ab50be3d5cf

    SHA256

    d9fe5bdceeea4b6d7df6517e3cbbf1c905fdbf5a2726b394c942132b41d7b7bb

    SHA512

    724ad77cdba2a6505e04ef7f51783ea9d5654df178db0df16123a8485611b71b43cd5bc88f3fca6ac68ef981becf475a6a2c1f30f9c8ef33ef38bb9b18a80c00

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un084612.exe

    Filesize

    550KB

    MD5

    90b10c0e296ef2dc0bda455b428776bf

    SHA1

    6fee97a53515717bed3df128bb164ab50be3d5cf

    SHA256

    d9fe5bdceeea4b6d7df6517e3cbbf1c905fdbf5a2726b394c942132b41d7b7bb

    SHA512

    724ad77cdba2a6505e04ef7f51783ea9d5654df178db0df16123a8485611b71b43cd5bc88f3fca6ac68ef981becf475a6a2c1f30f9c8ef33ef38bb9b18a80c00

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe

    Filesize

    278KB

    MD5

    cbae47461a1a60c1f0c654763684bcb7

    SHA1

    5a11eaea105ae7aa07117d7620854e165d1b7918

    SHA256

    577874c96a143b37e3e34cbc1b8ad88c05575972633c707e27cec2af9debfb36

    SHA512

    8d69b016e59c6b22b5b7afeb2788e8d226453fc72a132204deae52f0c06ed1f332baf47d4043a772df8057150223c4a2a6f74a4d7c2a719ec33e521a75b949c4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe

    Filesize

    278KB

    MD5

    cbae47461a1a60c1f0c654763684bcb7

    SHA1

    5a11eaea105ae7aa07117d7620854e165d1b7918

    SHA256

    577874c96a143b37e3e34cbc1b8ad88c05575972633c707e27cec2af9debfb36

    SHA512

    8d69b016e59c6b22b5b7afeb2788e8d226453fc72a132204deae52f0c06ed1f332baf47d4043a772df8057150223c4a2a6f74a4d7c2a719ec33e521a75b949c4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe

    Filesize

    278KB

    MD5

    cbae47461a1a60c1f0c654763684bcb7

    SHA1

    5a11eaea105ae7aa07117d7620854e165d1b7918

    SHA256

    577874c96a143b37e3e34cbc1b8ad88c05575972633c707e27cec2af9debfb36

    SHA512

    8d69b016e59c6b22b5b7afeb2788e8d226453fc72a132204deae52f0c06ed1f332baf47d4043a772df8057150223c4a2a6f74a4d7c2a719ec33e521a75b949c4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe

    Filesize

    361KB

    MD5

    e2d103d516c40e00c75afd6406f04623

    SHA1

    ff90fb95a8b3de2b1fd8ae31e39a84702736d443

    SHA256

    d44621426d05ed3d1947ae07350c3c5aff2ade538f13a7bd578b26f2ed2942f1

    SHA512

    764ce8d0c1a576e1299ce633dce6a0627c41fc87f464c1c5a28c2a32595a86718e571bd67b2d5d634befdd672988beeb1867b17f6f0e0d1c97d32c247d096c93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe

    Filesize

    361KB

    MD5

    e2d103d516c40e00c75afd6406f04623

    SHA1

    ff90fb95a8b3de2b1fd8ae31e39a84702736d443

    SHA256

    d44621426d05ed3d1947ae07350c3c5aff2ade538f13a7bd578b26f2ed2942f1

    SHA512

    764ce8d0c1a576e1299ce633dce6a0627c41fc87f464c1c5a28c2a32595a86718e571bd67b2d5d634befdd672988beeb1867b17f6f0e0d1c97d32c247d096c93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe

    Filesize

    361KB

    MD5

    e2d103d516c40e00c75afd6406f04623

    SHA1

    ff90fb95a8b3de2b1fd8ae31e39a84702736d443

    SHA256

    d44621426d05ed3d1947ae07350c3c5aff2ade538f13a7bd578b26f2ed2942f1

    SHA512

    764ce8d0c1a576e1299ce633dce6a0627c41fc87f464c1c5a28c2a32595a86718e571bd67b2d5d634befdd672988beeb1867b17f6f0e0d1c97d32c247d096c93

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un084612.exe

    Filesize

    550KB

    MD5

    90b10c0e296ef2dc0bda455b428776bf

    SHA1

    6fee97a53515717bed3df128bb164ab50be3d5cf

    SHA256

    d9fe5bdceeea4b6d7df6517e3cbbf1c905fdbf5a2726b394c942132b41d7b7bb

    SHA512

    724ad77cdba2a6505e04ef7f51783ea9d5654df178db0df16123a8485611b71b43cd5bc88f3fca6ac68ef981becf475a6a2c1f30f9c8ef33ef38bb9b18a80c00

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un084612.exe

    Filesize

    550KB

    MD5

    90b10c0e296ef2dc0bda455b428776bf

    SHA1

    6fee97a53515717bed3df128bb164ab50be3d5cf

    SHA256

    d9fe5bdceeea4b6d7df6517e3cbbf1c905fdbf5a2726b394c942132b41d7b7bb

    SHA512

    724ad77cdba2a6505e04ef7f51783ea9d5654df178db0df16123a8485611b71b43cd5bc88f3fca6ac68ef981becf475a6a2c1f30f9c8ef33ef38bb9b18a80c00

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe

    Filesize

    278KB

    MD5

    cbae47461a1a60c1f0c654763684bcb7

    SHA1

    5a11eaea105ae7aa07117d7620854e165d1b7918

    SHA256

    577874c96a143b37e3e34cbc1b8ad88c05575972633c707e27cec2af9debfb36

    SHA512

    8d69b016e59c6b22b5b7afeb2788e8d226453fc72a132204deae52f0c06ed1f332baf47d4043a772df8057150223c4a2a6f74a4d7c2a719ec33e521a75b949c4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe

    Filesize

    278KB

    MD5

    cbae47461a1a60c1f0c654763684bcb7

    SHA1

    5a11eaea105ae7aa07117d7620854e165d1b7918

    SHA256

    577874c96a143b37e3e34cbc1b8ad88c05575972633c707e27cec2af9debfb36

    SHA512

    8d69b016e59c6b22b5b7afeb2788e8d226453fc72a132204deae52f0c06ed1f332baf47d4043a772df8057150223c4a2a6f74a4d7c2a719ec33e521a75b949c4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe

    Filesize

    278KB

    MD5

    cbae47461a1a60c1f0c654763684bcb7

    SHA1

    5a11eaea105ae7aa07117d7620854e165d1b7918

    SHA256

    577874c96a143b37e3e34cbc1b8ad88c05575972633c707e27cec2af9debfb36

    SHA512

    8d69b016e59c6b22b5b7afeb2788e8d226453fc72a132204deae52f0c06ed1f332baf47d4043a772df8057150223c4a2a6f74a4d7c2a719ec33e521a75b949c4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe

    Filesize

    361KB

    MD5

    e2d103d516c40e00c75afd6406f04623

    SHA1

    ff90fb95a8b3de2b1fd8ae31e39a84702736d443

    SHA256

    d44621426d05ed3d1947ae07350c3c5aff2ade538f13a7bd578b26f2ed2942f1

    SHA512

    764ce8d0c1a576e1299ce633dce6a0627c41fc87f464c1c5a28c2a32595a86718e571bd67b2d5d634befdd672988beeb1867b17f6f0e0d1c97d32c247d096c93

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe

    Filesize

    361KB

    MD5

    e2d103d516c40e00c75afd6406f04623

    SHA1

    ff90fb95a8b3de2b1fd8ae31e39a84702736d443

    SHA256

    d44621426d05ed3d1947ae07350c3c5aff2ade538f13a7bd578b26f2ed2942f1

    SHA512

    764ce8d0c1a576e1299ce633dce6a0627c41fc87f464c1c5a28c2a32595a86718e571bd67b2d5d634befdd672988beeb1867b17f6f0e0d1c97d32c247d096c93

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe

    Filesize

    361KB

    MD5

    e2d103d516c40e00c75afd6406f04623

    SHA1

    ff90fb95a8b3de2b1fd8ae31e39a84702736d443

    SHA256

    d44621426d05ed3d1947ae07350c3c5aff2ade538f13a7bd578b26f2ed2942f1

    SHA512

    764ce8d0c1a576e1299ce633dce6a0627c41fc87f464c1c5a28c2a32595a86718e571bd67b2d5d634befdd672988beeb1867b17f6f0e0d1c97d32c247d096c93

  • memory/568-111-0x0000000000400000-0x0000000002BAF000-memory.dmp

    Filesize

    39.7MB

  • memory/568-86-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-88-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-90-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-92-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-94-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-104-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-110-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-108-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-106-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-102-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-100-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-98-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-96-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-84-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-114-0x0000000000400000-0x0000000002BAF000-memory.dmp

    Filesize

    39.7MB

  • memory/568-83-0x0000000003100000-0x0000000003112000-memory.dmp

    Filesize

    72KB

  • memory/568-82-0x0000000003100000-0x0000000003118000-memory.dmp

    Filesize

    96KB

  • memory/568-79-0x00000000002D0000-0x00000000002FD000-memory.dmp

    Filesize

    180KB

  • memory/568-80-0x00000000072E0000-0x0000000007320000-memory.dmp

    Filesize

    256KB

  • memory/568-81-0x00000000072E0000-0x0000000007320000-memory.dmp

    Filesize

    256KB

  • memory/568-78-0x0000000002FC0000-0x0000000002FDA000-memory.dmp

    Filesize

    104KB

  • memory/1504-126-0x00000000049C0000-0x00000000049FC000-memory.dmp

    Filesize

    240KB

  • memory/1504-147-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-127-0x0000000004A40000-0x0000000004A7A000-memory.dmp

    Filesize

    232KB

  • memory/1504-129-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-131-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-128-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-133-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-135-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-137-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-139-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-141-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-143-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-145-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-125-0x0000000000300000-0x0000000000346000-memory.dmp

    Filesize

    280KB

  • memory/1504-149-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-151-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-153-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-155-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-157-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-159-0x0000000004A40000-0x0000000004A75000-memory.dmp

    Filesize

    212KB

  • memory/1504-190-0x0000000004980000-0x00000000049C0000-memory.dmp

    Filesize

    256KB

  • memory/1504-192-0x0000000004980000-0x00000000049C0000-memory.dmp

    Filesize

    256KB

  • memory/1504-923-0x0000000004980000-0x00000000049C0000-memory.dmp

    Filesize

    256KB

  • memory/1504-924-0x0000000004980000-0x00000000049C0000-memory.dmp

    Filesize

    256KB

  • memory/1504-927-0x0000000004980000-0x00000000049C0000-memory.dmp

    Filesize

    256KB