Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:22

General

  • Target

    6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe

  • Size

    752KB

  • MD5

    068373078336a1f9de329e6552ef03cd

  • SHA1

    c826d8e37bc346f08e276ee86d643bd7753e1f24

  • SHA256

    6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd

  • SHA512

    33e8b399832d452ea8045d37795dd7832a3748a4ecdb59a57139e2e119ea40bab33d95ba861c5aef1b701e8b517ed4b1efcef02bfe8b97379376a3bf40fcd267

  • SSDEEP

    12288:3y90SFvqw0yS4vb66+8MJjVOsC4wQIeZjxdQC4WD6Vth+r/KiNz:3yTvqVXceBNVey/iCLCth+jKix

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe
    "C:\Users\Admin\AppData\Local\Temp\6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423781.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423781.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423781.exe

    Filesize

    598KB

    MD5

    9cdd0c27c092631e914d4aa08ac164f0

    SHA1

    f2ee93f6253a9a811d6a5e9cf680080c3c79ace5

    SHA256

    61c34b052e79d00f5efefca8eb5c42a5fe1b1f8d4efb6733d2476bd630e56af7

    SHA512

    dd64d0fd40271e8072115e7b882eb3eb500e479bc3cfe255534562c9186dfd09a99a98e887096937b114209cb36b33bdbb10b270f262b9aac66577ac741f2753

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423781.exe

    Filesize

    598KB

    MD5

    9cdd0c27c092631e914d4aa08ac164f0

    SHA1

    f2ee93f6253a9a811d6a5e9cf680080c3c79ace5

    SHA256

    61c34b052e79d00f5efefca8eb5c42a5fe1b1f8d4efb6733d2476bd630e56af7

    SHA512

    dd64d0fd40271e8072115e7b882eb3eb500e479bc3cfe255534562c9186dfd09a99a98e887096937b114209cb36b33bdbb10b270f262b9aac66577ac741f2753

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exe

    Filesize

    390KB

    MD5

    83782015280fc6704c298cc01f150a81

    SHA1

    e5a257df1611e22e71a093c2d87bd6e366640dab

    SHA256

    69121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167

    SHA512

    05ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exe

    Filesize

    390KB

    MD5

    83782015280fc6704c298cc01f150a81

    SHA1

    e5a257df1611e22e71a093c2d87bd6e366640dab

    SHA256

    69121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167

    SHA512

    05ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exe

    Filesize

    390KB

    MD5

    83782015280fc6704c298cc01f150a81

    SHA1

    e5a257df1611e22e71a093c2d87bd6e366640dab

    SHA256

    69121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167

    SHA512

    05ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exe

    Filesize

    473KB

    MD5

    6bbbc4a0580b78dbdbf54f5a90a74ea8

    SHA1

    a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c

    SHA256

    d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f

    SHA512

    b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exe

    Filesize

    473KB

    MD5

    6bbbc4a0580b78dbdbf54f5a90a74ea8

    SHA1

    a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c

    SHA256

    d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f

    SHA512

    b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exe

    Filesize

    473KB

    MD5

    6bbbc4a0580b78dbdbf54f5a90a74ea8

    SHA1

    a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c

    SHA256

    d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f

    SHA512

    b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un423781.exe

    Filesize

    598KB

    MD5

    9cdd0c27c092631e914d4aa08ac164f0

    SHA1

    f2ee93f6253a9a811d6a5e9cf680080c3c79ace5

    SHA256

    61c34b052e79d00f5efefca8eb5c42a5fe1b1f8d4efb6733d2476bd630e56af7

    SHA512

    dd64d0fd40271e8072115e7b882eb3eb500e479bc3cfe255534562c9186dfd09a99a98e887096937b114209cb36b33bdbb10b270f262b9aac66577ac741f2753

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un423781.exe

    Filesize

    598KB

    MD5

    9cdd0c27c092631e914d4aa08ac164f0

    SHA1

    f2ee93f6253a9a811d6a5e9cf680080c3c79ace5

    SHA256

    61c34b052e79d00f5efefca8eb5c42a5fe1b1f8d4efb6733d2476bd630e56af7

    SHA512

    dd64d0fd40271e8072115e7b882eb3eb500e479bc3cfe255534562c9186dfd09a99a98e887096937b114209cb36b33bdbb10b270f262b9aac66577ac741f2753

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exe

    Filesize

    390KB

    MD5

    83782015280fc6704c298cc01f150a81

    SHA1

    e5a257df1611e22e71a093c2d87bd6e366640dab

    SHA256

    69121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167

    SHA512

    05ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exe

    Filesize

    390KB

    MD5

    83782015280fc6704c298cc01f150a81

    SHA1

    e5a257df1611e22e71a093c2d87bd6e366640dab

    SHA256

    69121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167

    SHA512

    05ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exe

    Filesize

    390KB

    MD5

    83782015280fc6704c298cc01f150a81

    SHA1

    e5a257df1611e22e71a093c2d87bd6e366640dab

    SHA256

    69121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167

    SHA512

    05ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exe

    Filesize

    473KB

    MD5

    6bbbc4a0580b78dbdbf54f5a90a74ea8

    SHA1

    a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c

    SHA256

    d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f

    SHA512

    b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exe

    Filesize

    473KB

    MD5

    6bbbc4a0580b78dbdbf54f5a90a74ea8

    SHA1

    a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c

    SHA256

    d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f

    SHA512

    b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exe

    Filesize

    473KB

    MD5

    6bbbc4a0580b78dbdbf54f5a90a74ea8

    SHA1

    a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c

    SHA256

    d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f

    SHA512

    b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e

  • memory/432-109-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-79-0x00000000027F0000-0x0000000002830000-memory.dmp

    Filesize

    256KB

  • memory/432-87-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-89-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-91-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-93-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-95-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-99-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-97-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-103-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-101-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-107-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-105-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-111-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-84-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-112-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/432-113-0x00000000027F0000-0x0000000002830000-memory.dmp

    Filesize

    256KB

  • memory/432-114-0x00000000027F0000-0x0000000002830000-memory.dmp

    Filesize

    256KB

  • memory/432-116-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/432-83-0x00000000027F0000-0x0000000002830000-memory.dmp

    Filesize

    256KB

  • memory/432-82-0x00000000027F0000-0x0000000002830000-memory.dmp

    Filesize

    256KB

  • memory/432-81-0x0000000002140000-0x0000000002158000-memory.dmp

    Filesize

    96KB

  • memory/432-80-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/432-85-0x0000000002140000-0x0000000002152000-memory.dmp

    Filesize

    72KB

  • memory/432-78-0x00000000002C0000-0x00000000002ED000-memory.dmp

    Filesize

    180KB

  • memory/1712-144-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-146-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-129-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-130-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-132-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-134-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-136-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-138-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-140-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-148-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-128-0x0000000002710000-0x000000000274A000-memory.dmp

    Filesize

    232KB

  • memory/1712-127-0x0000000002490000-0x00000000024CC000-memory.dmp

    Filesize

    240KB

  • memory/1712-142-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-150-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-152-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-154-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-156-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-158-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-160-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/1712-224-0x00000000002E0000-0x0000000000326000-memory.dmp

    Filesize

    280KB

  • memory/1712-226-0x00000000028B0000-0x00000000028F0000-memory.dmp

    Filesize

    256KB

  • memory/1712-923-0x00000000028B0000-0x00000000028F0000-memory.dmp

    Filesize

    256KB