Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 22:40

General

  • Target

    058aacbcad499247c72f02d92b43a152f295c00c48acc17ae02b2f4bf791e89c.exe

  • Size

    746KB

  • MD5

    fcc48bdc47b58895fe1843bdb2436e2f

  • SHA1

    b5eada88b35d0ebc8bdfa081c0478b1c79c7fbd7

  • SHA256

    058aacbcad499247c72f02d92b43a152f295c00c48acc17ae02b2f4bf791e89c

  • SHA512

    9c1f72033c96e7000f50b3fe30ddbffeba51a43b1f3b93dc65fcfb1d46fa8ddc2dfc9d822a380eef63fd9ce66cb93e487e46d5a396418f1d13213fe7322581da

  • SSDEEP

    12288:Jy900e3IGtAwFbd5FqIM58wW6E+hANqaMzgAv+LGOIqvZwM9haBtSXHDvzHgxZfO:Jy+3IfMjkIoPW6EUageGOIqvq86SX7z7

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\058aacbcad499247c72f02d92b43a152f295c00c48acc17ae02b2f4bf791e89c.exe
    "C:\Users\Admin\AppData\Local\Temp\058aacbcad499247c72f02d92b43a152f295c00c48acc17ae02b2f4bf791e89c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954635.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954635.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00606732.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00606732.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk556002.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk556002.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954635.exe

    Filesize

    592KB

    MD5

    e2c3a0ec1773782104557fdb5aeb47fc

    SHA1

    60eedcf34fc9693bf796c6aa216de3abeba43481

    SHA256

    45a5bb8c01744c11e06c0b3db132404c591492aae89822ccdbfdaf9fd7759084

    SHA512

    4dae684b12729b6d0a5ed68dd64868640b44717d96e8218bdf3ebe47310548b5c0977758fd30dbe8a4bda6dc16f00d4a286292607494211b3d76c001910d2c30

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954635.exe

    Filesize

    592KB

    MD5

    e2c3a0ec1773782104557fdb5aeb47fc

    SHA1

    60eedcf34fc9693bf796c6aa216de3abeba43481

    SHA256

    45a5bb8c01744c11e06c0b3db132404c591492aae89822ccdbfdaf9fd7759084

    SHA512

    4dae684b12729b6d0a5ed68dd64868640b44717d96e8218bdf3ebe47310548b5c0977758fd30dbe8a4bda6dc16f00d4a286292607494211b3d76c001910d2c30

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00606732.exe

    Filesize

    376KB

    MD5

    34fc574bcc59b04eafd4ed6cf7ebf39f

    SHA1

    f8b65ede63eb924cbb710289afd32a54e679023a

    SHA256

    2d1ea6bf9b11836159ca22149f9b71e5afe6e25e55eb96f687feb9db4594b36a

    SHA512

    7d2f17ce5af518ea2f7804e1f340745713765dc753e685b9f480b9a67f3495a720d2132b4a8d1e0d2786ac312928882c04ca61e919873a83fac6704002cfc214

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00606732.exe

    Filesize

    376KB

    MD5

    34fc574bcc59b04eafd4ed6cf7ebf39f

    SHA1

    f8b65ede63eb924cbb710289afd32a54e679023a

    SHA256

    2d1ea6bf9b11836159ca22149f9b71e5afe6e25e55eb96f687feb9db4594b36a

    SHA512

    7d2f17ce5af518ea2f7804e1f340745713765dc753e685b9f480b9a67f3495a720d2132b4a8d1e0d2786ac312928882c04ca61e919873a83fac6704002cfc214

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\00606732.exe

    Filesize

    376KB

    MD5

    34fc574bcc59b04eafd4ed6cf7ebf39f

    SHA1

    f8b65ede63eb924cbb710289afd32a54e679023a

    SHA256

    2d1ea6bf9b11836159ca22149f9b71e5afe6e25e55eb96f687feb9db4594b36a

    SHA512

    7d2f17ce5af518ea2f7804e1f340745713765dc753e685b9f480b9a67f3495a720d2132b4a8d1e0d2786ac312928882c04ca61e919873a83fac6704002cfc214

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk556002.exe

    Filesize

    459KB

    MD5

    04ba8c71c8ed39cbc40b4aafe201a196

    SHA1

    dde05e61dc1aabc0ed9a47bfa12496cb2ad1c493

    SHA256

    8031f9d5a8bcf53157e8481406bc59ec42839fbac571df88295304e2c36c08ec

    SHA512

    df5ea7e5ff309d7ef0a169645502f39490bacfcdf332693abd93ed7b1da0cfd10cf0bd502acba58ba106d381868ab54a88af8500f5be46f9766e191f148e9307

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk556002.exe

    Filesize

    459KB

    MD5

    04ba8c71c8ed39cbc40b4aafe201a196

    SHA1

    dde05e61dc1aabc0ed9a47bfa12496cb2ad1c493

    SHA256

    8031f9d5a8bcf53157e8481406bc59ec42839fbac571df88295304e2c36c08ec

    SHA512

    df5ea7e5ff309d7ef0a169645502f39490bacfcdf332693abd93ed7b1da0cfd10cf0bd502acba58ba106d381868ab54a88af8500f5be46f9766e191f148e9307

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk556002.exe

    Filesize

    459KB

    MD5

    04ba8c71c8ed39cbc40b4aafe201a196

    SHA1

    dde05e61dc1aabc0ed9a47bfa12496cb2ad1c493

    SHA256

    8031f9d5a8bcf53157e8481406bc59ec42839fbac571df88295304e2c36c08ec

    SHA512

    df5ea7e5ff309d7ef0a169645502f39490bacfcdf332693abd93ed7b1da0cfd10cf0bd502acba58ba106d381868ab54a88af8500f5be46f9766e191f148e9307

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un954635.exe

    Filesize

    592KB

    MD5

    e2c3a0ec1773782104557fdb5aeb47fc

    SHA1

    60eedcf34fc9693bf796c6aa216de3abeba43481

    SHA256

    45a5bb8c01744c11e06c0b3db132404c591492aae89822ccdbfdaf9fd7759084

    SHA512

    4dae684b12729b6d0a5ed68dd64868640b44717d96e8218bdf3ebe47310548b5c0977758fd30dbe8a4bda6dc16f00d4a286292607494211b3d76c001910d2c30

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un954635.exe

    Filesize

    592KB

    MD5

    e2c3a0ec1773782104557fdb5aeb47fc

    SHA1

    60eedcf34fc9693bf796c6aa216de3abeba43481

    SHA256

    45a5bb8c01744c11e06c0b3db132404c591492aae89822ccdbfdaf9fd7759084

    SHA512

    4dae684b12729b6d0a5ed68dd64868640b44717d96e8218bdf3ebe47310548b5c0977758fd30dbe8a4bda6dc16f00d4a286292607494211b3d76c001910d2c30

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\00606732.exe

    Filesize

    376KB

    MD5

    34fc574bcc59b04eafd4ed6cf7ebf39f

    SHA1

    f8b65ede63eb924cbb710289afd32a54e679023a

    SHA256

    2d1ea6bf9b11836159ca22149f9b71e5afe6e25e55eb96f687feb9db4594b36a

    SHA512

    7d2f17ce5af518ea2f7804e1f340745713765dc753e685b9f480b9a67f3495a720d2132b4a8d1e0d2786ac312928882c04ca61e919873a83fac6704002cfc214

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\00606732.exe

    Filesize

    376KB

    MD5

    34fc574bcc59b04eafd4ed6cf7ebf39f

    SHA1

    f8b65ede63eb924cbb710289afd32a54e679023a

    SHA256

    2d1ea6bf9b11836159ca22149f9b71e5afe6e25e55eb96f687feb9db4594b36a

    SHA512

    7d2f17ce5af518ea2f7804e1f340745713765dc753e685b9f480b9a67f3495a720d2132b4a8d1e0d2786ac312928882c04ca61e919873a83fac6704002cfc214

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\00606732.exe

    Filesize

    376KB

    MD5

    34fc574bcc59b04eafd4ed6cf7ebf39f

    SHA1

    f8b65ede63eb924cbb710289afd32a54e679023a

    SHA256

    2d1ea6bf9b11836159ca22149f9b71e5afe6e25e55eb96f687feb9db4594b36a

    SHA512

    7d2f17ce5af518ea2f7804e1f340745713765dc753e685b9f480b9a67f3495a720d2132b4a8d1e0d2786ac312928882c04ca61e919873a83fac6704002cfc214

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk556002.exe

    Filesize

    459KB

    MD5

    04ba8c71c8ed39cbc40b4aafe201a196

    SHA1

    dde05e61dc1aabc0ed9a47bfa12496cb2ad1c493

    SHA256

    8031f9d5a8bcf53157e8481406bc59ec42839fbac571df88295304e2c36c08ec

    SHA512

    df5ea7e5ff309d7ef0a169645502f39490bacfcdf332693abd93ed7b1da0cfd10cf0bd502acba58ba106d381868ab54a88af8500f5be46f9766e191f148e9307

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk556002.exe

    Filesize

    459KB

    MD5

    04ba8c71c8ed39cbc40b4aafe201a196

    SHA1

    dde05e61dc1aabc0ed9a47bfa12496cb2ad1c493

    SHA256

    8031f9d5a8bcf53157e8481406bc59ec42839fbac571df88295304e2c36c08ec

    SHA512

    df5ea7e5ff309d7ef0a169645502f39490bacfcdf332693abd93ed7b1da0cfd10cf0bd502acba58ba106d381868ab54a88af8500f5be46f9766e191f148e9307

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk556002.exe

    Filesize

    459KB

    MD5

    04ba8c71c8ed39cbc40b4aafe201a196

    SHA1

    dde05e61dc1aabc0ed9a47bfa12496cb2ad1c493

    SHA256

    8031f9d5a8bcf53157e8481406bc59ec42839fbac571df88295304e2c36c08ec

    SHA512

    df5ea7e5ff309d7ef0a169645502f39490bacfcdf332693abd93ed7b1da0cfd10cf0bd502acba58ba106d381868ab54a88af8500f5be46f9766e191f148e9307

  • memory/780-111-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/780-78-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/780-88-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-90-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-92-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-94-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-96-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-98-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-100-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-102-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-104-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-106-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-108-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-110-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-84-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-114-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/780-83-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/780-80-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/780-82-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/780-81-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/780-79-0x0000000000E40000-0x0000000000E58000-memory.dmp

    Filesize

    96KB

  • memory/780-86-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/1844-141-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-127-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/1844-143-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-128-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-129-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-131-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-133-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-135-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-145-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-139-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-923-0x0000000002CD0000-0x0000000002D10000-memory.dmp

    Filesize

    256KB

  • memory/1844-126-0x0000000001020000-0x000000000105A000-memory.dmp

    Filesize

    232KB

  • memory/1844-137-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-147-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-149-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-151-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-153-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-155-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-157-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-159-0x0000000001020000-0x0000000001055000-memory.dmp

    Filesize

    212KB

  • memory/1844-920-0x0000000002CD0000-0x0000000002D10000-memory.dmp

    Filesize

    256KB

  • memory/1844-125-0x0000000000FE0000-0x000000000101C000-memory.dmp

    Filesize

    240KB