Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:16

General

  • Target

    057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe

  • Size

    651KB

  • MD5

    610a8f214fb76216b3990fd4fbb845fe

  • SHA1

    8ccd2ca761997fb625181a0e9f4bf2565544972d

  • SHA256

    057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3

  • SHA512

    24e4c4c8ceb86c685f53294009ab2180314bed40ee41266a2fe957b61997635f1c205220ec191a97efdee2a5e0e0107e4e4a2146d07a308d4ea698e9f2941bf1

  • SSDEEP

    12288:ey90kEcu9yZZtJc4qoXR7iDPoGKnKNkpMy39EEZdL1fcy:eywcugZZtJPqoB2DPtNC3CEZ5my

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe
    "C:\Users\Admin\AppData\Local\Temp\057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:820

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe

          Filesize

          497KB

          MD5

          a45c6a540b71e6e50d9ce824e014b9b5

          SHA1

          2ee7dd09f4baaff2cf586d85ea97ed71ff7be2ae

          SHA256

          e85f9afe2c58b09a4006f1e52b52a69140df83f5d438cd74709968623197b3a7

          SHA512

          d89da634a0c967ca039e430c503444406e4a2727a4bcbb058cf2fa99ff77ffcee08360e019016d3015fc42fe04c98ea44c0cba530d7721610a8e6effe0a2fff5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe

          Filesize

          497KB

          MD5

          a45c6a540b71e6e50d9ce824e014b9b5

          SHA1

          2ee7dd09f4baaff2cf586d85ea97ed71ff7be2ae

          SHA256

          e85f9afe2c58b09a4006f1e52b52a69140df83f5d438cd74709968623197b3a7

          SHA512

          d89da634a0c967ca039e430c503444406e4a2727a4bcbb058cf2fa99ff77ffcee08360e019016d3015fc42fe04c98ea44c0cba530d7721610a8e6effe0a2fff5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe

          Filesize

          341KB

          MD5

          c1800cb8710bcd33cb601334e60f3a10

          SHA1

          f02f9d87a5558d1507c6ba11473c5c81fc91706f

          SHA256

          9c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52

          SHA512

          33d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe

          Filesize

          341KB

          MD5

          c1800cb8710bcd33cb601334e60f3a10

          SHA1

          f02f9d87a5558d1507c6ba11473c5c81fc91706f

          SHA256

          9c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52

          SHA512

          33d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe

          Filesize

          341KB

          MD5

          c1800cb8710bcd33cb601334e60f3a10

          SHA1

          f02f9d87a5558d1507c6ba11473c5c81fc91706f

          SHA256

          9c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52

          SHA512

          33d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe

          Filesize

          497KB

          MD5

          a45c6a540b71e6e50d9ce824e014b9b5

          SHA1

          2ee7dd09f4baaff2cf586d85ea97ed71ff7be2ae

          SHA256

          e85f9afe2c58b09a4006f1e52b52a69140df83f5d438cd74709968623197b3a7

          SHA512

          d89da634a0c967ca039e430c503444406e4a2727a4bcbb058cf2fa99ff77ffcee08360e019016d3015fc42fe04c98ea44c0cba530d7721610a8e6effe0a2fff5

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe

          Filesize

          497KB

          MD5

          a45c6a540b71e6e50d9ce824e014b9b5

          SHA1

          2ee7dd09f4baaff2cf586d85ea97ed71ff7be2ae

          SHA256

          e85f9afe2c58b09a4006f1e52b52a69140df83f5d438cd74709968623197b3a7

          SHA512

          d89da634a0c967ca039e430c503444406e4a2727a4bcbb058cf2fa99ff77ffcee08360e019016d3015fc42fe04c98ea44c0cba530d7721610a8e6effe0a2fff5

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe

          Filesize

          341KB

          MD5

          c1800cb8710bcd33cb601334e60f3a10

          SHA1

          f02f9d87a5558d1507c6ba11473c5c81fc91706f

          SHA256

          9c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52

          SHA512

          33d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe

          Filesize

          341KB

          MD5

          c1800cb8710bcd33cb601334e60f3a10

          SHA1

          f02f9d87a5558d1507c6ba11473c5c81fc91706f

          SHA256

          9c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52

          SHA512

          33d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe

          Filesize

          341KB

          MD5

          c1800cb8710bcd33cb601334e60f3a10

          SHA1

          f02f9d87a5558d1507c6ba11473c5c81fc91706f

          SHA256

          9c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52

          SHA512

          33d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4

        • memory/568-83-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-85-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-87-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-89-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-91-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-93-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-95-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-97-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-99-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-101-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-103-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-105-0x0000000004C20000-0x0000000004C60000-memory.dmp

          Filesize

          256KB

        • memory/568-104-0x0000000004C20000-0x0000000004C60000-memory.dmp

          Filesize

          256KB

        • memory/568-81-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-79-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-77-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-76-0x0000000000870000-0x0000000000883000-memory.dmp

          Filesize

          76KB

        • memory/568-75-0x0000000000870000-0x0000000000888000-memory.dmp

          Filesize

          96KB

        • memory/568-74-0x0000000000340000-0x000000000035A000-memory.dmp

          Filesize

          104KB

        • memory/820-121-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-131-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-118-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-119-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-116-0x0000000002020000-0x000000000205C000-memory.dmp

          Filesize

          240KB

        • memory/820-123-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-125-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-127-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-129-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-137-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-139-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-135-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-133-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-117-0x0000000002060000-0x000000000209A000-memory.dmp

          Filesize

          232KB

        • memory/820-141-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-143-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-145-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-147-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-149-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-151-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-153-0x0000000002060000-0x0000000002095000-memory.dmp

          Filesize

          212KB

        • memory/820-435-0x0000000000310000-0x0000000000356000-memory.dmp

          Filesize

          280KB

        • memory/820-437-0x0000000004BC0000-0x0000000004C00000-memory.dmp

          Filesize

          256KB

        • memory/820-913-0x0000000004BC0000-0x0000000004C00000-memory.dmp

          Filesize

          256KB

        • memory/820-914-0x0000000004BC0000-0x0000000004C00000-memory.dmp

          Filesize

          256KB

        • memory/820-917-0x0000000004BC0000-0x0000000004C00000-memory.dmp

          Filesize

          256KB