Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:15

General

  • Target

    0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe

  • Size

    376KB

  • MD5

    58bfcc846b7cd6fb7ecd56c46d612bc9

  • SHA1

    c1d90ea706e78e698b0132aa4aaf0cb307c345a8

  • SHA256

    0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff

  • SHA512

    ee32a6bbea6398dd9e56327226edafca7048ebe86c99a2df1bc2eaba63f874e120dea0f74ac48905ea998f4555bbcf667a353a684e081809cad57b95f7c20c7b

  • SSDEEP

    6144:Key+bnr+3p0yN90QE9E2dMI6diUexAAvQrz8x8gNkkAoaXIbKv4sXiqOXyv:CMrPy90XyI6TeqAQcOkAxXIGv4sXidCv

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe
    "C:\Users\Admin\AppData\Local\Temp\0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0324893.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0324893.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6378541.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6378541.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5367556.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5367556.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0324893.exe

    Filesize

    204KB

    MD5

    f8cef0829a7c4e131fb45c55e6f81203

    SHA1

    da8f0db2a48f6857b6f76d9aed92223946752809

    SHA256

    0fa5d39c7ddd3ccbc36bffe2012f04b1ddd25df1c32bda97043615810d61a5db

    SHA512

    2b095ab2fddf00cb711a6a66fc6b7bfd19c2bdd825d2cac83741ddb72906cdc52f29e95822b72c0bae82b6ec675e30d4efc0e194917fe63fe6259290f7ccb85e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0324893.exe

    Filesize

    204KB

    MD5

    f8cef0829a7c4e131fb45c55e6f81203

    SHA1

    da8f0db2a48f6857b6f76d9aed92223946752809

    SHA256

    0fa5d39c7ddd3ccbc36bffe2012f04b1ddd25df1c32bda97043615810d61a5db

    SHA512

    2b095ab2fddf00cb711a6a66fc6b7bfd19c2bdd825d2cac83741ddb72906cdc52f29e95822b72c0bae82b6ec675e30d4efc0e194917fe63fe6259290f7ccb85e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6378541.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6378541.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5367556.exe

    Filesize

    136KB

    MD5

    30d0ee0947be55272def37f502e40d83

    SHA1

    67dec087565870ddbba362f33bc909491d56f0d7

    SHA256

    876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514

    SHA512

    0b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5367556.exe

    Filesize

    136KB

    MD5

    30d0ee0947be55272def37f502e40d83

    SHA1

    67dec087565870ddbba362f33bc909491d56f0d7

    SHA256

    876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514

    SHA512

    0b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0324893.exe

    Filesize

    204KB

    MD5

    f8cef0829a7c4e131fb45c55e6f81203

    SHA1

    da8f0db2a48f6857b6f76d9aed92223946752809

    SHA256

    0fa5d39c7ddd3ccbc36bffe2012f04b1ddd25df1c32bda97043615810d61a5db

    SHA512

    2b095ab2fddf00cb711a6a66fc6b7bfd19c2bdd825d2cac83741ddb72906cdc52f29e95822b72c0bae82b6ec675e30d4efc0e194917fe63fe6259290f7ccb85e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0324893.exe

    Filesize

    204KB

    MD5

    f8cef0829a7c4e131fb45c55e6f81203

    SHA1

    da8f0db2a48f6857b6f76d9aed92223946752809

    SHA256

    0fa5d39c7ddd3ccbc36bffe2012f04b1ddd25df1c32bda97043615810d61a5db

    SHA512

    2b095ab2fddf00cb711a6a66fc6b7bfd19c2bdd825d2cac83741ddb72906cdc52f29e95822b72c0bae82b6ec675e30d4efc0e194917fe63fe6259290f7ccb85e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\a6378541.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\b5367556.exe

    Filesize

    136KB

    MD5

    30d0ee0947be55272def37f502e40d83

    SHA1

    67dec087565870ddbba362f33bc909491d56f0d7

    SHA256

    876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514

    SHA512

    0b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\b5367556.exe

    Filesize

    136KB

    MD5

    30d0ee0947be55272def37f502e40d83

    SHA1

    67dec087565870ddbba362f33bc909491d56f0d7

    SHA256

    876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514

    SHA512

    0b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284

  • memory/740-79-0x0000000000B30000-0x0000000000B58000-memory.dmp

    Filesize

    160KB

  • memory/740-80-0x0000000007000000-0x0000000007040000-memory.dmp

    Filesize

    256KB

  • memory/740-81-0x0000000007000000-0x0000000007040000-memory.dmp

    Filesize

    256KB

  • memory/1444-72-0x00000000011E0000-0x00000000011EA000-memory.dmp

    Filesize

    40KB