Analysis

  • max time kernel
    148s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:33

General

  • Target

    00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe

  • Size

    706KB

  • MD5

    e9a5b3842d7355d05de43a37a126df52

  • SHA1

    1eb9911b8d5a3c7f41135bb73b26e9143366cc00

  • SHA256

    00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60

  • SHA512

    ff7b99429a02c9ec26892a6f09540bb435fb0f3c1c225a6f5ede7dff9e107b58afca9f2eb459abd371d040f3bed942e7d63dd668c24f84146479fe31a38c6fda

  • SSDEEP

    12288:Sy90H879pOov8vrYhCM/vOXjLZUQa9uHHmbTnc7kj9gqeo6KJSyyHxGw58wsLg1f:Sy979pA8vmz0WHmbTQkfXSpRGwqjLg1f

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe
    "C:\Users\Admin\AppData\Local\Temp\00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un272951.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un272951.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr850363.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr850363.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750535.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750535.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1148

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un272951.exe

    Filesize

    552KB

    MD5

    5a8a32086d05955382fb0a586633f1d4

    SHA1

    51b379133f65a3106de3c588af28ef9d405e3cb8

    SHA256

    b94bf3f280e0453cf5381f201dc602494466a99f5bdac7424f562ee643b7cc0c

    SHA512

    9dbd35911fcd791c0a4ee1e53b9b2589c8d25d7bf3e9ff1857320834e344373a60523d81eafee1259613a48de1868b7c12ab32b6c9af06cd15d43a7abfa24300

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un272951.exe

    Filesize

    552KB

    MD5

    5a8a32086d05955382fb0a586633f1d4

    SHA1

    51b379133f65a3106de3c588af28ef9d405e3cb8

    SHA256

    b94bf3f280e0453cf5381f201dc602494466a99f5bdac7424f562ee643b7cc0c

    SHA512

    9dbd35911fcd791c0a4ee1e53b9b2589c8d25d7bf3e9ff1857320834e344373a60523d81eafee1259613a48de1868b7c12ab32b6c9af06cd15d43a7abfa24300

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr850363.exe

    Filesize

    285KB

    MD5

    82cd22c2aa4364a503a8edbdd0e5cbc5

    SHA1

    a47c3fd93bdee9235e9624935ccb32430cc5c1c7

    SHA256

    91245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2

    SHA512

    4e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr850363.exe

    Filesize

    285KB

    MD5

    82cd22c2aa4364a503a8edbdd0e5cbc5

    SHA1

    a47c3fd93bdee9235e9624935ccb32430cc5c1c7

    SHA256

    91245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2

    SHA512

    4e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr850363.exe

    Filesize

    285KB

    MD5

    82cd22c2aa4364a503a8edbdd0e5cbc5

    SHA1

    a47c3fd93bdee9235e9624935ccb32430cc5c1c7

    SHA256

    91245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2

    SHA512

    4e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750535.exe

    Filesize

    367KB

    MD5

    78714ad68eec3116e729db23d3f8c19d

    SHA1

    e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a

    SHA256

    b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4

    SHA512

    a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750535.exe

    Filesize

    367KB

    MD5

    78714ad68eec3116e729db23d3f8c19d

    SHA1

    e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a

    SHA256

    b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4

    SHA512

    a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750535.exe

    Filesize

    367KB

    MD5

    78714ad68eec3116e729db23d3f8c19d

    SHA1

    e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a

    SHA256

    b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4

    SHA512

    a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un272951.exe

    Filesize

    552KB

    MD5

    5a8a32086d05955382fb0a586633f1d4

    SHA1

    51b379133f65a3106de3c588af28ef9d405e3cb8

    SHA256

    b94bf3f280e0453cf5381f201dc602494466a99f5bdac7424f562ee643b7cc0c

    SHA512

    9dbd35911fcd791c0a4ee1e53b9b2589c8d25d7bf3e9ff1857320834e344373a60523d81eafee1259613a48de1868b7c12ab32b6c9af06cd15d43a7abfa24300

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un272951.exe

    Filesize

    552KB

    MD5

    5a8a32086d05955382fb0a586633f1d4

    SHA1

    51b379133f65a3106de3c588af28ef9d405e3cb8

    SHA256

    b94bf3f280e0453cf5381f201dc602494466a99f5bdac7424f562ee643b7cc0c

    SHA512

    9dbd35911fcd791c0a4ee1e53b9b2589c8d25d7bf3e9ff1857320834e344373a60523d81eafee1259613a48de1868b7c12ab32b6c9af06cd15d43a7abfa24300

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pr850363.exe

    Filesize

    285KB

    MD5

    82cd22c2aa4364a503a8edbdd0e5cbc5

    SHA1

    a47c3fd93bdee9235e9624935ccb32430cc5c1c7

    SHA256

    91245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2

    SHA512

    4e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pr850363.exe

    Filesize

    285KB

    MD5

    82cd22c2aa4364a503a8edbdd0e5cbc5

    SHA1

    a47c3fd93bdee9235e9624935ccb32430cc5c1c7

    SHA256

    91245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2

    SHA512

    4e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pr850363.exe

    Filesize

    285KB

    MD5

    82cd22c2aa4364a503a8edbdd0e5cbc5

    SHA1

    a47c3fd93bdee9235e9624935ccb32430cc5c1c7

    SHA256

    91245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2

    SHA512

    4e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750535.exe

    Filesize

    367KB

    MD5

    78714ad68eec3116e729db23d3f8c19d

    SHA1

    e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a

    SHA256

    b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4

    SHA512

    a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750535.exe

    Filesize

    367KB

    MD5

    78714ad68eec3116e729db23d3f8c19d

    SHA1

    e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a

    SHA256

    b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4

    SHA512

    a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750535.exe

    Filesize

    367KB

    MD5

    78714ad68eec3116e729db23d3f8c19d

    SHA1

    e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a

    SHA256

    b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4

    SHA512

    a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317

  • memory/580-111-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-85-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-87-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-89-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-91-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-93-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-95-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-97-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-99-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-101-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-103-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-105-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-107-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-109-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-84-0x0000000002FC0000-0x0000000002FD2000-memory.dmp

    Filesize

    72KB

  • memory/580-112-0x0000000007420000-0x0000000007460000-memory.dmp

    Filesize

    256KB

  • memory/580-116-0x0000000000400000-0x0000000002BB1000-memory.dmp

    Filesize

    39.7MB

  • memory/580-83-0x0000000000400000-0x0000000002BB1000-memory.dmp

    Filesize

    39.7MB

  • memory/580-82-0x0000000002FC0000-0x0000000002FD8000-memory.dmp

    Filesize

    96KB

  • memory/580-80-0x0000000007420000-0x0000000007460000-memory.dmp

    Filesize

    256KB

  • memory/580-81-0x0000000007420000-0x0000000007460000-memory.dmp

    Filesize

    256KB

  • memory/580-79-0x0000000002D50000-0x0000000002D6A000-memory.dmp

    Filesize

    104KB

  • memory/580-78-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/1148-127-0x0000000004820000-0x000000000485C000-memory.dmp

    Filesize

    240KB

  • memory/1148-128-0x00000000049D0000-0x0000000004A0A000-memory.dmp

    Filesize

    232KB

  • memory/1148-130-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-132-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-129-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-134-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-136-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-138-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-142-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-140-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-144-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-146-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-148-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-150-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-152-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-154-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-156-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-158-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/1148-727-0x00000000002C0000-0x0000000000306000-memory.dmp

    Filesize

    280KB

  • memory/1148-728-0x0000000007430000-0x0000000007470000-memory.dmp

    Filesize

    256KB

  • memory/1148-731-0x0000000007430000-0x0000000007470000-memory.dmp

    Filesize

    256KB

  • memory/1148-924-0x0000000007430000-0x0000000007470000-memory.dmp

    Filesize

    256KB

  • memory/1148-926-0x0000000007430000-0x0000000007470000-memory.dmp

    Filesize

    256KB

  • memory/1148-927-0x0000000007430000-0x0000000007470000-memory.dmp

    Filesize

    256KB