Analysis

  • max time kernel
    150s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 22:25

General

  • Target

    6d407a2523b0cb6b61fd58dcaf8f4f68fde833dc81d100011423211d2439e3d9.exe

  • Size

    690KB

  • MD5

    c7ab0dfa09afc1aacc39af792090052b

  • SHA1

    3a20067dff58b476ce6b3fba3ed551d6d0a19438

  • SHA256

    6d407a2523b0cb6b61fd58dcaf8f4f68fde833dc81d100011423211d2439e3d9

  • SHA512

    c056825909e60ae2862cca8bda46bb302fd31837c96d759b03395656edd0f5a782cd0807490f0a4758db17829349ebc01dac54b0df217eace5557f0c30b2dd12

  • SSDEEP

    12288:Wy90erFygb3dfQykHWF/czVYfW/O8n8uGDIHXjzzpQFPR:WyfrFygbGbHWceWD8uGsHXPzSR

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d407a2523b0cb6b61fd58dcaf8f4f68fde833dc81d100011423211d2439e3d9.exe
    "C:\Users\Admin\AppData\Local\Temp\6d407a2523b0cb6b61fd58dcaf8f4f68fde833dc81d100011423211d2439e3d9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un805149.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un805149.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17096008.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17096008.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk977136.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk977136.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un805149.exe

    Filesize

    536KB

    MD5

    8eb75e6baae062bf2cb8127821fb60d9

    SHA1

    1c8c1509866e4ac5794d0dd04140b42a655f0734

    SHA256

    d2811ed518c66fd3a4cbbfdcc5c9c92fbab7aef8257832be64a481fcf3a6fad1

    SHA512

    9d973161e72ab3d15f52f3e1d8a3ad3c053fbcc4b02477dd747d4fb65f769b9820d1c38497a2d5e5bd0eb31279891d466b58b6dca9d1578cfacb21ad5ee9089d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un805149.exe

    Filesize

    536KB

    MD5

    8eb75e6baae062bf2cb8127821fb60d9

    SHA1

    1c8c1509866e4ac5794d0dd04140b42a655f0734

    SHA256

    d2811ed518c66fd3a4cbbfdcc5c9c92fbab7aef8257832be64a481fcf3a6fad1

    SHA512

    9d973161e72ab3d15f52f3e1d8a3ad3c053fbcc4b02477dd747d4fb65f769b9820d1c38497a2d5e5bd0eb31279891d466b58b6dca9d1578cfacb21ad5ee9089d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17096008.exe

    Filesize

    258KB

    MD5

    4669a11cd7aef374c63512c330bc6509

    SHA1

    6bee14310e8cf66955cb8392eeaa1ca936cb3126

    SHA256

    b129c02bf0b5ba073a4001ec057aaa998af61d71cf7854c29f6c41d6f1a02021

    SHA512

    05a68ca77ec8bbf6696c613b0ce484ef0a06547db83be855cb9d3cd8939bb5833b6348d669d95261544b696dfc5a35ec29071880eee27583c91ea1fc4110b5ce

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17096008.exe

    Filesize

    258KB

    MD5

    4669a11cd7aef374c63512c330bc6509

    SHA1

    6bee14310e8cf66955cb8392eeaa1ca936cb3126

    SHA256

    b129c02bf0b5ba073a4001ec057aaa998af61d71cf7854c29f6c41d6f1a02021

    SHA512

    05a68ca77ec8bbf6696c613b0ce484ef0a06547db83be855cb9d3cd8939bb5833b6348d669d95261544b696dfc5a35ec29071880eee27583c91ea1fc4110b5ce

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17096008.exe

    Filesize

    258KB

    MD5

    4669a11cd7aef374c63512c330bc6509

    SHA1

    6bee14310e8cf66955cb8392eeaa1ca936cb3126

    SHA256

    b129c02bf0b5ba073a4001ec057aaa998af61d71cf7854c29f6c41d6f1a02021

    SHA512

    05a68ca77ec8bbf6696c613b0ce484ef0a06547db83be855cb9d3cd8939bb5833b6348d669d95261544b696dfc5a35ec29071880eee27583c91ea1fc4110b5ce

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk977136.exe

    Filesize

    342KB

    MD5

    2325b16d2fb21cd5009e2e0b1347b6c3

    SHA1

    f0b3b049ec5c26b9ebe0b33465e33d0c9fdee0b0

    SHA256

    1e09ed9c9aedc43a62e4aa6842befd51df78122607c2cc99b00b7a2e8029fb27

    SHA512

    142d9d6bd7b4fd614ecf4bf0865b37b7153b6fc4a9399868e326d5b24d699ea3ec984456798f451ff2b589124ed36fad984637989120c6ccd37535f7854a5aee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk977136.exe

    Filesize

    342KB

    MD5

    2325b16d2fb21cd5009e2e0b1347b6c3

    SHA1

    f0b3b049ec5c26b9ebe0b33465e33d0c9fdee0b0

    SHA256

    1e09ed9c9aedc43a62e4aa6842befd51df78122607c2cc99b00b7a2e8029fb27

    SHA512

    142d9d6bd7b4fd614ecf4bf0865b37b7153b6fc4a9399868e326d5b24d699ea3ec984456798f451ff2b589124ed36fad984637989120c6ccd37535f7854a5aee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk977136.exe

    Filesize

    342KB

    MD5

    2325b16d2fb21cd5009e2e0b1347b6c3

    SHA1

    f0b3b049ec5c26b9ebe0b33465e33d0c9fdee0b0

    SHA256

    1e09ed9c9aedc43a62e4aa6842befd51df78122607c2cc99b00b7a2e8029fb27

    SHA512

    142d9d6bd7b4fd614ecf4bf0865b37b7153b6fc4a9399868e326d5b24d699ea3ec984456798f451ff2b589124ed36fad984637989120c6ccd37535f7854a5aee

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un805149.exe

    Filesize

    536KB

    MD5

    8eb75e6baae062bf2cb8127821fb60d9

    SHA1

    1c8c1509866e4ac5794d0dd04140b42a655f0734

    SHA256

    d2811ed518c66fd3a4cbbfdcc5c9c92fbab7aef8257832be64a481fcf3a6fad1

    SHA512

    9d973161e72ab3d15f52f3e1d8a3ad3c053fbcc4b02477dd747d4fb65f769b9820d1c38497a2d5e5bd0eb31279891d466b58b6dca9d1578cfacb21ad5ee9089d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un805149.exe

    Filesize

    536KB

    MD5

    8eb75e6baae062bf2cb8127821fb60d9

    SHA1

    1c8c1509866e4ac5794d0dd04140b42a655f0734

    SHA256

    d2811ed518c66fd3a4cbbfdcc5c9c92fbab7aef8257832be64a481fcf3a6fad1

    SHA512

    9d973161e72ab3d15f52f3e1d8a3ad3c053fbcc4b02477dd747d4fb65f769b9820d1c38497a2d5e5bd0eb31279891d466b58b6dca9d1578cfacb21ad5ee9089d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\17096008.exe

    Filesize

    258KB

    MD5

    4669a11cd7aef374c63512c330bc6509

    SHA1

    6bee14310e8cf66955cb8392eeaa1ca936cb3126

    SHA256

    b129c02bf0b5ba073a4001ec057aaa998af61d71cf7854c29f6c41d6f1a02021

    SHA512

    05a68ca77ec8bbf6696c613b0ce484ef0a06547db83be855cb9d3cd8939bb5833b6348d669d95261544b696dfc5a35ec29071880eee27583c91ea1fc4110b5ce

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\17096008.exe

    Filesize

    258KB

    MD5

    4669a11cd7aef374c63512c330bc6509

    SHA1

    6bee14310e8cf66955cb8392eeaa1ca936cb3126

    SHA256

    b129c02bf0b5ba073a4001ec057aaa998af61d71cf7854c29f6c41d6f1a02021

    SHA512

    05a68ca77ec8bbf6696c613b0ce484ef0a06547db83be855cb9d3cd8939bb5833b6348d669d95261544b696dfc5a35ec29071880eee27583c91ea1fc4110b5ce

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\17096008.exe

    Filesize

    258KB

    MD5

    4669a11cd7aef374c63512c330bc6509

    SHA1

    6bee14310e8cf66955cb8392eeaa1ca936cb3126

    SHA256

    b129c02bf0b5ba073a4001ec057aaa998af61d71cf7854c29f6c41d6f1a02021

    SHA512

    05a68ca77ec8bbf6696c613b0ce484ef0a06547db83be855cb9d3cd8939bb5833b6348d669d95261544b696dfc5a35ec29071880eee27583c91ea1fc4110b5ce

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk977136.exe

    Filesize

    342KB

    MD5

    2325b16d2fb21cd5009e2e0b1347b6c3

    SHA1

    f0b3b049ec5c26b9ebe0b33465e33d0c9fdee0b0

    SHA256

    1e09ed9c9aedc43a62e4aa6842befd51df78122607c2cc99b00b7a2e8029fb27

    SHA512

    142d9d6bd7b4fd614ecf4bf0865b37b7153b6fc4a9399868e326d5b24d699ea3ec984456798f451ff2b589124ed36fad984637989120c6ccd37535f7854a5aee

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk977136.exe

    Filesize

    342KB

    MD5

    2325b16d2fb21cd5009e2e0b1347b6c3

    SHA1

    f0b3b049ec5c26b9ebe0b33465e33d0c9fdee0b0

    SHA256

    1e09ed9c9aedc43a62e4aa6842befd51df78122607c2cc99b00b7a2e8029fb27

    SHA512

    142d9d6bd7b4fd614ecf4bf0865b37b7153b6fc4a9399868e326d5b24d699ea3ec984456798f451ff2b589124ed36fad984637989120c6ccd37535f7854a5aee

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk977136.exe

    Filesize

    342KB

    MD5

    2325b16d2fb21cd5009e2e0b1347b6c3

    SHA1

    f0b3b049ec5c26b9ebe0b33465e33d0c9fdee0b0

    SHA256

    1e09ed9c9aedc43a62e4aa6842befd51df78122607c2cc99b00b7a2e8029fb27

    SHA512

    142d9d6bd7b4fd614ecf4bf0865b37b7153b6fc4a9399868e326d5b24d699ea3ec984456798f451ff2b589124ed36fad984637989120c6ccd37535f7854a5aee

  • memory/1288-154-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-136-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-158-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-156-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-130-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-152-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-150-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-148-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-146-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-144-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-142-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-140-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-138-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-819-0x0000000000290000-0x00000000002D6000-memory.dmp

    Filesize

    280KB

  • memory/1288-134-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-129-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-132-0x00000000023B0000-0x00000000023E5000-memory.dmp

    Filesize

    212KB

  • memory/1288-821-0x00000000025C0000-0x0000000002600000-memory.dmp

    Filesize

    256KB

  • memory/1288-823-0x00000000025C0000-0x0000000002600000-memory.dmp

    Filesize

    256KB

  • memory/1288-924-0x00000000025C0000-0x0000000002600000-memory.dmp

    Filesize

    256KB

  • memory/1288-926-0x00000000025C0000-0x0000000002600000-memory.dmp

    Filesize

    256KB

  • memory/1288-927-0x00000000025C0000-0x0000000002600000-memory.dmp

    Filesize

    256KB

  • memory/1288-929-0x00000000025C0000-0x0000000002600000-memory.dmp

    Filesize

    256KB

  • memory/1288-127-0x0000000002370000-0x00000000023AC000-memory.dmp

    Filesize

    240KB

  • memory/1288-128-0x00000000023B0000-0x00000000023EA000-memory.dmp

    Filesize

    232KB

  • memory/1852-86-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-116-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1852-112-0x0000000002220000-0x0000000002260000-memory.dmp

    Filesize

    256KB

  • memory/1852-111-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1852-109-0x0000000002220000-0x0000000002260000-memory.dmp

    Filesize

    256KB

  • memory/1852-110-0x0000000002220000-0x0000000002260000-memory.dmp

    Filesize

    256KB

  • memory/1852-108-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-106-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-104-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-102-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-100-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-98-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-96-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-94-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-92-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-90-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-88-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-84-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-82-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-81-0x0000000000530000-0x0000000000543000-memory.dmp

    Filesize

    76KB

  • memory/1852-80-0x0000000000530000-0x0000000000548000-memory.dmp

    Filesize

    96KB

  • memory/1852-79-0x0000000000500000-0x000000000051A000-memory.dmp

    Filesize

    104KB

  • memory/1852-78-0x0000000000250000-0x000000000027D000-memory.dmp

    Filesize

    180KB