Analysis

  • max time kernel
    152s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 22:34

General

  • Target

    014a9e8fbdb3f7117e8324da41bd3bb68b97e24cf6740a5020ff9dc74e4255b1.exe

  • Size

    967KB

  • MD5

    1c9f861298e4440ff01f1bb04334c18d

  • SHA1

    d59e78023ac56060ac185fce4d51bc52826a6fac

  • SHA256

    014a9e8fbdb3f7117e8324da41bd3bb68b97e24cf6740a5020ff9dc74e4255b1

  • SHA512

    59c9da1e6090d5ead987226cb773d207b51668fde010a84ecc24d4437c70cc26b81ca41898b05ba1ced98db39fdf36e826cd0059fe901eae12f84ce3d515fc92

  • SSDEEP

    12288:By90s6yTKb1k1QGVJuQ7sM46pVYHmztBg+BP0qu08wMqs/9t2VpNsGSfiLUWuSCM:ByJnKbDf16f6mZBg+BNT8w77AIirM

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\014a9e8fbdb3f7117e8324da41bd3bb68b97e24cf6740a5020ff9dc74e4255b1.exe
    "C:\Users\Admin\AppData\Local\Temp\014a9e8fbdb3f7117e8324da41bd3bb68b97e24cf6740a5020ff9dc74e4255b1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un590895.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un590895.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un001505.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un001505.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1140
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr931218.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr931218.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu053887.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu053887.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un590895.exe

    Filesize

    707KB

    MD5

    4e5c7bb3e66553e0f96a4f8663333f72

    SHA1

    451c566c4c615f896a92d8c27219fd233fe81a52

    SHA256

    c84634dc6012ac0980c2dc03652b200a49dab337eaf5c5ddb269bd0ca47aea71

    SHA512

    46b42d8418c2f9fa6fae9a19b3cdf48e65df7710c2ca4e9a3644be5b506e9555d421d7d7f9135536b19692c83b30408833bb17cebbfc4d4d3529cb414e1b9d80

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un590895.exe

    Filesize

    707KB

    MD5

    4e5c7bb3e66553e0f96a4f8663333f72

    SHA1

    451c566c4c615f896a92d8c27219fd233fe81a52

    SHA256

    c84634dc6012ac0980c2dc03652b200a49dab337eaf5c5ddb269bd0ca47aea71

    SHA512

    46b42d8418c2f9fa6fae9a19b3cdf48e65df7710c2ca4e9a3644be5b506e9555d421d7d7f9135536b19692c83b30408833bb17cebbfc4d4d3529cb414e1b9d80

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un001505.exe

    Filesize

    553KB

    MD5

    8860d93d7bf9022bb2041c2c1b9ef094

    SHA1

    08ba97bfab0990d0cd1a60068f891671261cbe10

    SHA256

    a1134e3169fb79229874e6370cc924db7c6a70a460a4d0b91517b7215060a390

    SHA512

    e2f49425b6e198f2de4a2c0ac861dee4e13ab17bf56f0fa11d9e69a5b695fcb1fc00c1967fb5b2658e0563d9cbdfbeb40e4036453f2f2df0e7522fa10333eb63

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un001505.exe

    Filesize

    553KB

    MD5

    8860d93d7bf9022bb2041c2c1b9ef094

    SHA1

    08ba97bfab0990d0cd1a60068f891671261cbe10

    SHA256

    a1134e3169fb79229874e6370cc924db7c6a70a460a4d0b91517b7215060a390

    SHA512

    e2f49425b6e198f2de4a2c0ac861dee4e13ab17bf56f0fa11d9e69a5b695fcb1fc00c1967fb5b2658e0563d9cbdfbeb40e4036453f2f2df0e7522fa10333eb63

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr931218.exe

    Filesize

    278KB

    MD5

    11830aee697750aea139bf14cc6b5abd

    SHA1

    01de053b6d6ea2c84789a9521ed1f046a0b0646b

    SHA256

    178e6fbe5464b77f49f2c413f3efafbcbeef0c9f5dcb09691acbf78edd864c79

    SHA512

    b2da6ae4b2264c5b5b81acd7e9e04cbae591f600f397c0bd51111f268cddd8ca3cdd6b7b2e6fe3974942c592aba4dd39e0b1763aa585c59ba98fdc43944ec55b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr931218.exe

    Filesize

    278KB

    MD5

    11830aee697750aea139bf14cc6b5abd

    SHA1

    01de053b6d6ea2c84789a9521ed1f046a0b0646b

    SHA256

    178e6fbe5464b77f49f2c413f3efafbcbeef0c9f5dcb09691acbf78edd864c79

    SHA512

    b2da6ae4b2264c5b5b81acd7e9e04cbae591f600f397c0bd51111f268cddd8ca3cdd6b7b2e6fe3974942c592aba4dd39e0b1763aa585c59ba98fdc43944ec55b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr931218.exe

    Filesize

    278KB

    MD5

    11830aee697750aea139bf14cc6b5abd

    SHA1

    01de053b6d6ea2c84789a9521ed1f046a0b0646b

    SHA256

    178e6fbe5464b77f49f2c413f3efafbcbeef0c9f5dcb09691acbf78edd864c79

    SHA512

    b2da6ae4b2264c5b5b81acd7e9e04cbae591f600f397c0bd51111f268cddd8ca3cdd6b7b2e6fe3974942c592aba4dd39e0b1763aa585c59ba98fdc43944ec55b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu053887.exe

    Filesize

    360KB

    MD5

    475504a079e8969adb601b776615f5ca

    SHA1

    ef8c503fb660e2b3363e1fc7b86223aef4fc25bc

    SHA256

    24a33d8cd9177f1c71fe3647d7062de015c8b573d62fed975bed1ebb0f5cb90e

    SHA512

    795f241bad8be4f8be6d61f21c6fddffabc9550d9e362be345737bff64e43a5e401ca0622f3ee78857011323a96361e454ac9b84e9fe6b85ef65a86c16a2e623

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu053887.exe

    Filesize

    360KB

    MD5

    475504a079e8969adb601b776615f5ca

    SHA1

    ef8c503fb660e2b3363e1fc7b86223aef4fc25bc

    SHA256

    24a33d8cd9177f1c71fe3647d7062de015c8b573d62fed975bed1ebb0f5cb90e

    SHA512

    795f241bad8be4f8be6d61f21c6fddffabc9550d9e362be345737bff64e43a5e401ca0622f3ee78857011323a96361e454ac9b84e9fe6b85ef65a86c16a2e623

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu053887.exe

    Filesize

    360KB

    MD5

    475504a079e8969adb601b776615f5ca

    SHA1

    ef8c503fb660e2b3363e1fc7b86223aef4fc25bc

    SHA256

    24a33d8cd9177f1c71fe3647d7062de015c8b573d62fed975bed1ebb0f5cb90e

    SHA512

    795f241bad8be4f8be6d61f21c6fddffabc9550d9e362be345737bff64e43a5e401ca0622f3ee78857011323a96361e454ac9b84e9fe6b85ef65a86c16a2e623

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un590895.exe

    Filesize

    707KB

    MD5

    4e5c7bb3e66553e0f96a4f8663333f72

    SHA1

    451c566c4c615f896a92d8c27219fd233fe81a52

    SHA256

    c84634dc6012ac0980c2dc03652b200a49dab337eaf5c5ddb269bd0ca47aea71

    SHA512

    46b42d8418c2f9fa6fae9a19b3cdf48e65df7710c2ca4e9a3644be5b506e9555d421d7d7f9135536b19692c83b30408833bb17cebbfc4d4d3529cb414e1b9d80

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un590895.exe

    Filesize

    707KB

    MD5

    4e5c7bb3e66553e0f96a4f8663333f72

    SHA1

    451c566c4c615f896a92d8c27219fd233fe81a52

    SHA256

    c84634dc6012ac0980c2dc03652b200a49dab337eaf5c5ddb269bd0ca47aea71

    SHA512

    46b42d8418c2f9fa6fae9a19b3cdf48e65df7710c2ca4e9a3644be5b506e9555d421d7d7f9135536b19692c83b30408833bb17cebbfc4d4d3529cb414e1b9d80

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\un001505.exe

    Filesize

    553KB

    MD5

    8860d93d7bf9022bb2041c2c1b9ef094

    SHA1

    08ba97bfab0990d0cd1a60068f891671261cbe10

    SHA256

    a1134e3169fb79229874e6370cc924db7c6a70a460a4d0b91517b7215060a390

    SHA512

    e2f49425b6e198f2de4a2c0ac861dee4e13ab17bf56f0fa11d9e69a5b695fcb1fc00c1967fb5b2658e0563d9cbdfbeb40e4036453f2f2df0e7522fa10333eb63

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\un001505.exe

    Filesize

    553KB

    MD5

    8860d93d7bf9022bb2041c2c1b9ef094

    SHA1

    08ba97bfab0990d0cd1a60068f891671261cbe10

    SHA256

    a1134e3169fb79229874e6370cc924db7c6a70a460a4d0b91517b7215060a390

    SHA512

    e2f49425b6e198f2de4a2c0ac861dee4e13ab17bf56f0fa11d9e69a5b695fcb1fc00c1967fb5b2658e0563d9cbdfbeb40e4036453f2f2df0e7522fa10333eb63

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\pr931218.exe

    Filesize

    278KB

    MD5

    11830aee697750aea139bf14cc6b5abd

    SHA1

    01de053b6d6ea2c84789a9521ed1f046a0b0646b

    SHA256

    178e6fbe5464b77f49f2c413f3efafbcbeef0c9f5dcb09691acbf78edd864c79

    SHA512

    b2da6ae4b2264c5b5b81acd7e9e04cbae591f600f397c0bd51111f268cddd8ca3cdd6b7b2e6fe3974942c592aba4dd39e0b1763aa585c59ba98fdc43944ec55b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\pr931218.exe

    Filesize

    278KB

    MD5

    11830aee697750aea139bf14cc6b5abd

    SHA1

    01de053b6d6ea2c84789a9521ed1f046a0b0646b

    SHA256

    178e6fbe5464b77f49f2c413f3efafbcbeef0c9f5dcb09691acbf78edd864c79

    SHA512

    b2da6ae4b2264c5b5b81acd7e9e04cbae591f600f397c0bd51111f268cddd8ca3cdd6b7b2e6fe3974942c592aba4dd39e0b1763aa585c59ba98fdc43944ec55b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\pr931218.exe

    Filesize

    278KB

    MD5

    11830aee697750aea139bf14cc6b5abd

    SHA1

    01de053b6d6ea2c84789a9521ed1f046a0b0646b

    SHA256

    178e6fbe5464b77f49f2c413f3efafbcbeef0c9f5dcb09691acbf78edd864c79

    SHA512

    b2da6ae4b2264c5b5b81acd7e9e04cbae591f600f397c0bd51111f268cddd8ca3cdd6b7b2e6fe3974942c592aba4dd39e0b1763aa585c59ba98fdc43944ec55b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\qu053887.exe

    Filesize

    360KB

    MD5

    475504a079e8969adb601b776615f5ca

    SHA1

    ef8c503fb660e2b3363e1fc7b86223aef4fc25bc

    SHA256

    24a33d8cd9177f1c71fe3647d7062de015c8b573d62fed975bed1ebb0f5cb90e

    SHA512

    795f241bad8be4f8be6d61f21c6fddffabc9550d9e362be345737bff64e43a5e401ca0622f3ee78857011323a96361e454ac9b84e9fe6b85ef65a86c16a2e623

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\qu053887.exe

    Filesize

    360KB

    MD5

    475504a079e8969adb601b776615f5ca

    SHA1

    ef8c503fb660e2b3363e1fc7b86223aef4fc25bc

    SHA256

    24a33d8cd9177f1c71fe3647d7062de015c8b573d62fed975bed1ebb0f5cb90e

    SHA512

    795f241bad8be4f8be6d61f21c6fddffabc9550d9e362be345737bff64e43a5e401ca0622f3ee78857011323a96361e454ac9b84e9fe6b85ef65a86c16a2e623

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\qu053887.exe

    Filesize

    360KB

    MD5

    475504a079e8969adb601b776615f5ca

    SHA1

    ef8c503fb660e2b3363e1fc7b86223aef4fc25bc

    SHA256

    24a33d8cd9177f1c71fe3647d7062de015c8b573d62fed975bed1ebb0f5cb90e

    SHA512

    795f241bad8be4f8be6d61f21c6fddffabc9550d9e362be345737bff64e43a5e401ca0622f3ee78857011323a96361e454ac9b84e9fe6b85ef65a86c16a2e623

  • memory/592-121-0x00000000044A0000-0x00000000044E0000-memory.dmp

    Filesize

    256KB

  • memory/592-97-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-99-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-101-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-103-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-105-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-107-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-109-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-111-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-113-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-115-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-117-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-119-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-120-0x00000000044A0000-0x00000000044E0000-memory.dmp

    Filesize

    256KB

  • memory/592-95-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-122-0x0000000000400000-0x0000000002B9F000-memory.dmp

    Filesize

    39.6MB

  • memory/592-123-0x00000000044A0000-0x00000000044E0000-memory.dmp

    Filesize

    256KB

  • memory/592-124-0x00000000044A0000-0x00000000044E0000-memory.dmp

    Filesize

    256KB

  • memory/592-129-0x0000000000400000-0x0000000002B9F000-memory.dmp

    Filesize

    39.6MB

  • memory/592-93-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-92-0x0000000004530000-0x0000000004542000-memory.dmp

    Filesize

    72KB

  • memory/592-91-0x0000000004530000-0x0000000004548000-memory.dmp

    Filesize

    96KB

  • memory/592-90-0x00000000044A0000-0x00000000044E0000-memory.dmp

    Filesize

    256KB

  • memory/592-89-0x0000000000270000-0x000000000029D000-memory.dmp

    Filesize

    180KB

  • memory/592-88-0x00000000044E0000-0x00000000044FA000-memory.dmp

    Filesize

    104KB

  • memory/2000-141-0x0000000004560000-0x000000000459C000-memory.dmp

    Filesize

    240KB

  • memory/2000-142-0x0000000004C40000-0x0000000004C7A000-memory.dmp

    Filesize

    232KB

  • memory/2000-140-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/2000-143-0x00000000070C0000-0x0000000007100000-memory.dmp

    Filesize

    256KB

  • memory/2000-144-0x00000000070C0000-0x0000000007100000-memory.dmp

    Filesize

    256KB

  • memory/2000-145-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-146-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-148-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-150-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-152-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-156-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-160-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-162-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-166-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-168-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-170-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-172-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-174-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-164-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-158-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-154-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/2000-939-0x00000000070C0000-0x0000000007100000-memory.dmp

    Filesize

    256KB

  • memory/2000-940-0x00000000070C0000-0x0000000007100000-memory.dmp

    Filesize

    256KB

  • memory/2000-941-0x00000000070C0000-0x0000000007100000-memory.dmp

    Filesize

    256KB

  • memory/2000-943-0x00000000070C0000-0x0000000007100000-memory.dmp

    Filesize

    256KB