Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 22:37

General

  • Target

    030a3047053c0951c877033ae7b8394f8889052aa9564ebb65cbaa0b25e41f5c.exe

  • Size

    694KB

  • MD5

    69d4160bbfefda8fd6481b25158fa7f4

  • SHA1

    e498f77d023c2ad95c050c1b90dc3026df5a716e

  • SHA256

    030a3047053c0951c877033ae7b8394f8889052aa9564ebb65cbaa0b25e41f5c

  • SHA512

    a67d52e85242a3049ff540542725795b8c393d69fb9747eee1bed85f3e6f57687305ebda71ee1c259c1729134f1e7c89b7fe2de824862cc5c19dc5297745f77e

  • SSDEEP

    12288:by905RiNpoEioZ6L6J4wpFTUirGfG5eWz6Fp18bSKlA+l+2l0834X:byCR8poey5oFLrGfK6Fp18bSqG2lve

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\030a3047053c0951c877033ae7b8394f8889052aa9564ebb65cbaa0b25e41f5c.exe
    "C:\Users\Admin\AppData\Local\Temp\030a3047053c0951c877033ae7b8394f8889052aa9564ebb65cbaa0b25e41f5c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054237.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054237.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85856717.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85856717.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812703.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812703.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054237.exe

    Filesize

    540KB

    MD5

    e4fb0a1bc923cce78ad0af1d684f4366

    SHA1

    ba5ed8e805784ae6697fea2b0fb859dbc803bca1

    SHA256

    ccb984c68ffee26a679adf532c80e0721a0e64369dc81689d0073f09f9812b6d

    SHA512

    4259dc63bd6470754fbac868d2e9fe86ec14de9e081a34506e79b10b2526ac1f7ad78cda3fa49e5cb30e2000e81f742d36b018ddfa6370f246a04d8c16066a3b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054237.exe

    Filesize

    540KB

    MD5

    e4fb0a1bc923cce78ad0af1d684f4366

    SHA1

    ba5ed8e805784ae6697fea2b0fb859dbc803bca1

    SHA256

    ccb984c68ffee26a679adf532c80e0721a0e64369dc81689d0073f09f9812b6d

    SHA512

    4259dc63bd6470754fbac868d2e9fe86ec14de9e081a34506e79b10b2526ac1f7ad78cda3fa49e5cb30e2000e81f742d36b018ddfa6370f246a04d8c16066a3b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85856717.exe

    Filesize

    258KB

    MD5

    323f8fc86af5cb6da06fbca6600c3ac2

    SHA1

    e420f6d593f5e05ca9528f2d75414f8848d03907

    SHA256

    0cdc9c9660bb8b30bf460a5004f937c197688a397377b133dd1a02334d32da17

    SHA512

    e3fb60971288c7c1fb675a87658781b0ff493fd56a4dda0e9441fe41d19f4b582f8212f80c8b43464809df818152cc80d807a6d6237125fc823ab27b6dbea6ff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85856717.exe

    Filesize

    258KB

    MD5

    323f8fc86af5cb6da06fbca6600c3ac2

    SHA1

    e420f6d593f5e05ca9528f2d75414f8848d03907

    SHA256

    0cdc9c9660bb8b30bf460a5004f937c197688a397377b133dd1a02334d32da17

    SHA512

    e3fb60971288c7c1fb675a87658781b0ff493fd56a4dda0e9441fe41d19f4b582f8212f80c8b43464809df818152cc80d807a6d6237125fc823ab27b6dbea6ff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85856717.exe

    Filesize

    258KB

    MD5

    323f8fc86af5cb6da06fbca6600c3ac2

    SHA1

    e420f6d593f5e05ca9528f2d75414f8848d03907

    SHA256

    0cdc9c9660bb8b30bf460a5004f937c197688a397377b133dd1a02334d32da17

    SHA512

    e3fb60971288c7c1fb675a87658781b0ff493fd56a4dda0e9441fe41d19f4b582f8212f80c8b43464809df818152cc80d807a6d6237125fc823ab27b6dbea6ff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812703.exe

    Filesize

    340KB

    MD5

    e71cf27eca06104a89fbefc4a89fa2b6

    SHA1

    c8d8c67833ebc3007fcec52dcb89297a0ca6621e

    SHA256

    a1d0e2d0640b8fd735b88d26b898a6912f2f62cff3aad35197122950d550eec7

    SHA512

    a18ae4d74663ed0191107e0ec1e6af8eac6480958cbcc26afab665089d13c7a19503f2dca255ee3c2412ad27fcbd132ade157b069750c505ab09b8e4601466d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812703.exe

    Filesize

    340KB

    MD5

    e71cf27eca06104a89fbefc4a89fa2b6

    SHA1

    c8d8c67833ebc3007fcec52dcb89297a0ca6621e

    SHA256

    a1d0e2d0640b8fd735b88d26b898a6912f2f62cff3aad35197122950d550eec7

    SHA512

    a18ae4d74663ed0191107e0ec1e6af8eac6480958cbcc26afab665089d13c7a19503f2dca255ee3c2412ad27fcbd132ade157b069750c505ab09b8e4601466d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812703.exe

    Filesize

    340KB

    MD5

    e71cf27eca06104a89fbefc4a89fa2b6

    SHA1

    c8d8c67833ebc3007fcec52dcb89297a0ca6621e

    SHA256

    a1d0e2d0640b8fd735b88d26b898a6912f2f62cff3aad35197122950d550eec7

    SHA512

    a18ae4d74663ed0191107e0ec1e6af8eac6480958cbcc26afab665089d13c7a19503f2dca255ee3c2412ad27fcbd132ade157b069750c505ab09b8e4601466d0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un054237.exe

    Filesize

    540KB

    MD5

    e4fb0a1bc923cce78ad0af1d684f4366

    SHA1

    ba5ed8e805784ae6697fea2b0fb859dbc803bca1

    SHA256

    ccb984c68ffee26a679adf532c80e0721a0e64369dc81689d0073f09f9812b6d

    SHA512

    4259dc63bd6470754fbac868d2e9fe86ec14de9e081a34506e79b10b2526ac1f7ad78cda3fa49e5cb30e2000e81f742d36b018ddfa6370f246a04d8c16066a3b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un054237.exe

    Filesize

    540KB

    MD5

    e4fb0a1bc923cce78ad0af1d684f4366

    SHA1

    ba5ed8e805784ae6697fea2b0fb859dbc803bca1

    SHA256

    ccb984c68ffee26a679adf532c80e0721a0e64369dc81689d0073f09f9812b6d

    SHA512

    4259dc63bd6470754fbac868d2e9fe86ec14de9e081a34506e79b10b2526ac1f7ad78cda3fa49e5cb30e2000e81f742d36b018ddfa6370f246a04d8c16066a3b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\85856717.exe

    Filesize

    258KB

    MD5

    323f8fc86af5cb6da06fbca6600c3ac2

    SHA1

    e420f6d593f5e05ca9528f2d75414f8848d03907

    SHA256

    0cdc9c9660bb8b30bf460a5004f937c197688a397377b133dd1a02334d32da17

    SHA512

    e3fb60971288c7c1fb675a87658781b0ff493fd56a4dda0e9441fe41d19f4b582f8212f80c8b43464809df818152cc80d807a6d6237125fc823ab27b6dbea6ff

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\85856717.exe

    Filesize

    258KB

    MD5

    323f8fc86af5cb6da06fbca6600c3ac2

    SHA1

    e420f6d593f5e05ca9528f2d75414f8848d03907

    SHA256

    0cdc9c9660bb8b30bf460a5004f937c197688a397377b133dd1a02334d32da17

    SHA512

    e3fb60971288c7c1fb675a87658781b0ff493fd56a4dda0e9441fe41d19f4b582f8212f80c8b43464809df818152cc80d807a6d6237125fc823ab27b6dbea6ff

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\85856717.exe

    Filesize

    258KB

    MD5

    323f8fc86af5cb6da06fbca6600c3ac2

    SHA1

    e420f6d593f5e05ca9528f2d75414f8848d03907

    SHA256

    0cdc9c9660bb8b30bf460a5004f937c197688a397377b133dd1a02334d32da17

    SHA512

    e3fb60971288c7c1fb675a87658781b0ff493fd56a4dda0e9441fe41d19f4b582f8212f80c8b43464809df818152cc80d807a6d6237125fc823ab27b6dbea6ff

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812703.exe

    Filesize

    340KB

    MD5

    e71cf27eca06104a89fbefc4a89fa2b6

    SHA1

    c8d8c67833ebc3007fcec52dcb89297a0ca6621e

    SHA256

    a1d0e2d0640b8fd735b88d26b898a6912f2f62cff3aad35197122950d550eec7

    SHA512

    a18ae4d74663ed0191107e0ec1e6af8eac6480958cbcc26afab665089d13c7a19503f2dca255ee3c2412ad27fcbd132ade157b069750c505ab09b8e4601466d0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812703.exe

    Filesize

    340KB

    MD5

    e71cf27eca06104a89fbefc4a89fa2b6

    SHA1

    c8d8c67833ebc3007fcec52dcb89297a0ca6621e

    SHA256

    a1d0e2d0640b8fd735b88d26b898a6912f2f62cff3aad35197122950d550eec7

    SHA512

    a18ae4d74663ed0191107e0ec1e6af8eac6480958cbcc26afab665089d13c7a19503f2dca255ee3c2412ad27fcbd132ade157b069750c505ab09b8e4601466d0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812703.exe

    Filesize

    340KB

    MD5

    e71cf27eca06104a89fbefc4a89fa2b6

    SHA1

    c8d8c67833ebc3007fcec52dcb89297a0ca6621e

    SHA256

    a1d0e2d0640b8fd735b88d26b898a6912f2f62cff3aad35197122950d550eec7

    SHA512

    a18ae4d74663ed0191107e0ec1e6af8eac6480958cbcc26afab665089d13c7a19503f2dca255ee3c2412ad27fcbd132ade157b069750c505ab09b8e4601466d0

  • memory/760-84-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-85-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-87-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-89-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-97-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-99-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-95-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-93-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-91-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-101-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-103-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-105-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-109-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-111-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-107-0x0000000004910000-0x0000000004923000-memory.dmp

    Filesize

    76KB

  • memory/760-113-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/760-83-0x0000000004910000-0x0000000004928000-memory.dmp

    Filesize

    96KB

  • memory/760-82-0x0000000007260000-0x00000000072A0000-memory.dmp

    Filesize

    256KB

  • memory/760-81-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/760-80-0x0000000007260000-0x00000000072A0000-memory.dmp

    Filesize

    256KB

  • memory/760-79-0x0000000004700000-0x000000000471A000-memory.dmp

    Filesize

    104KB

  • memory/760-78-0x00000000003D0000-0x00000000003FD000-memory.dmp

    Filesize

    180KB

  • memory/1684-125-0x0000000004990000-0x00000000049CA000-memory.dmp

    Filesize

    232KB

  • memory/1684-144-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-126-0x00000000002C0000-0x0000000000306000-memory.dmp

    Filesize

    280KB

  • memory/1684-127-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-129-0x0000000007200000-0x0000000007240000-memory.dmp

    Filesize

    256KB

  • memory/1684-131-0x0000000007200000-0x0000000007240000-memory.dmp

    Filesize

    256KB

  • memory/1684-132-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-134-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-128-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-136-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-138-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-142-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-146-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-124-0x0000000004900000-0x000000000493C000-memory.dmp

    Filesize

    240KB

  • memory/1684-148-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-140-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-150-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-152-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-154-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-156-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-158-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-160-0x0000000004990000-0x00000000049C5000-memory.dmp

    Filesize

    212KB

  • memory/1684-922-0x0000000007200000-0x0000000007240000-memory.dmp

    Filesize

    256KB

  • memory/1684-923-0x0000000007200000-0x0000000007240000-memory.dmp

    Filesize

    256KB

  • memory/1684-924-0x0000000007200000-0x0000000007240000-memory.dmp

    Filesize

    256KB

  • memory/1684-926-0x0000000007200000-0x0000000007240000-memory.dmp

    Filesize

    256KB