Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:19

General

  • Target

    06f923789847124d5cf5af1c138cb8ca0acdba28915b51263c57a5e01bfe395a.exe

  • Size

    1.0MB

  • MD5

    8559dc4b4c935e16dce9b3c56fb87ee5

  • SHA1

    42b37881d55a9cff8534c7fda2286c6bd775bc95

  • SHA256

    06f923789847124d5cf5af1c138cb8ca0acdba28915b51263c57a5e01bfe395a

  • SHA512

    7eb88f1d8eeb7c0712ab985ae2c2860724dc8bb78c0988cad1372310997fe9b1021f2b018313122e0b9424fcb3e206c7071067a3f192f5682bd0a424cf3ea75b

  • SSDEEP

    24576:2yhhkLPHnfKkTCnxRw/JsImsi4nyrzb9JxT3B/n:FhhkLPHfZWxRQJxpyrzb1N/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06f923789847124d5cf5af1c138cb8ca0acdba28915b51263c57a5e01bfe395a.exe
    "C:\Users\Admin\AppData\Local\Temp\06f923789847124d5cf5af1c138cb8ca0acdba28915b51263c57a5e01bfe395a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za915788.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za915788.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za944897.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za944897.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\94719278.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\94719278.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:612
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w83SK94.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w83SK94.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1660

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za915788.exe

          Filesize

          775KB

          MD5

          d2d0eb5fc1730dd8b4b5a60867ba0339

          SHA1

          57c4bbfdd19fdbe4f4f4d2fcab0196533589271e

          SHA256

          e83e740253077a2b455d22e7e580db98e4f4348ebfdc156a07b37eec30ed2e80

          SHA512

          0d647684049e910ebf6286124068071bd992374c5bd02cfe226acc9c93df8f50dc7515befa5296c16286c854585cfb93b7e7cd8ffdbbb44771457d20e229c6d0

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za915788.exe

          Filesize

          775KB

          MD5

          d2d0eb5fc1730dd8b4b5a60867ba0339

          SHA1

          57c4bbfdd19fdbe4f4f4d2fcab0196533589271e

          SHA256

          e83e740253077a2b455d22e7e580db98e4f4348ebfdc156a07b37eec30ed2e80

          SHA512

          0d647684049e910ebf6286124068071bd992374c5bd02cfe226acc9c93df8f50dc7515befa5296c16286c854585cfb93b7e7cd8ffdbbb44771457d20e229c6d0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za944897.exe

          Filesize

          592KB

          MD5

          0738f122da5ea083d91a535be4d2d63a

          SHA1

          f6677a1c994047138bb8b43f5467ba3b3e7ae275

          SHA256

          5af40ba4b89f5c22aaac54abeb88611524622fee0af2b5fff821f7f12ae0d14e

          SHA512

          13f3f2d825d4271d78268dff35dfc83cade619f2c2afa5762066b5ac7fe193b6003d052eecf3a6abef01de8288fac0b20618bd1e35564cd843ec86fee79b0c5c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za944897.exe

          Filesize

          592KB

          MD5

          0738f122da5ea083d91a535be4d2d63a

          SHA1

          f6677a1c994047138bb8b43f5467ba3b3e7ae275

          SHA256

          5af40ba4b89f5c22aaac54abeb88611524622fee0af2b5fff821f7f12ae0d14e

          SHA512

          13f3f2d825d4271d78268dff35dfc83cade619f2c2afa5762066b5ac7fe193b6003d052eecf3a6abef01de8288fac0b20618bd1e35564cd843ec86fee79b0c5c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\94719278.exe

          Filesize

          377KB

          MD5

          cd74bfda8a7df788c9f3421b6c810a3a

          SHA1

          7aad29ed789b32b3efa67ac5da3027597ccd19e4

          SHA256

          879ed32cf0d8c805610d6a415e272a26a31708f464f93c8e1527beb432770614

          SHA512

          d4f33cea0c460317f3c02ae54f70973687623e9ab2a9b863f5d18fe3a5380ad8a25612eacb8cb4d31e931999dddbbf37ea5c7ab926169da3ae14e80e0c8e154a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\94719278.exe

          Filesize

          377KB

          MD5

          cd74bfda8a7df788c9f3421b6c810a3a

          SHA1

          7aad29ed789b32b3efa67ac5da3027597ccd19e4

          SHA256

          879ed32cf0d8c805610d6a415e272a26a31708f464f93c8e1527beb432770614

          SHA512

          d4f33cea0c460317f3c02ae54f70973687623e9ab2a9b863f5d18fe3a5380ad8a25612eacb8cb4d31e931999dddbbf37ea5c7ab926169da3ae14e80e0c8e154a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\94719278.exe

          Filesize

          377KB

          MD5

          cd74bfda8a7df788c9f3421b6c810a3a

          SHA1

          7aad29ed789b32b3efa67ac5da3027597ccd19e4

          SHA256

          879ed32cf0d8c805610d6a415e272a26a31708f464f93c8e1527beb432770614

          SHA512

          d4f33cea0c460317f3c02ae54f70973687623e9ab2a9b863f5d18fe3a5380ad8a25612eacb8cb4d31e931999dddbbf37ea5c7ab926169da3ae14e80e0c8e154a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w83SK94.exe

          Filesize

          459KB

          MD5

          ecd5c9208701e9d74a5ad2b714155bd3

          SHA1

          27fdf77bdeabacf3fa027d3db5c6105004901f14

          SHA256

          c6fde9050eb858d97515c324565ccba43ef49bde77b7e83f2f62ad09b2e7e115

          SHA512

          495217cc5a44df5081c5ae1b11a38bf120c34a8167dfc1d0b5c84ef5c1a437919265d53e8675e14921e2b6c4971cf3bd4c0eb2d52e33cbabf4f80bae5f1c0c00

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w83SK94.exe

          Filesize

          459KB

          MD5

          ecd5c9208701e9d74a5ad2b714155bd3

          SHA1

          27fdf77bdeabacf3fa027d3db5c6105004901f14

          SHA256

          c6fde9050eb858d97515c324565ccba43ef49bde77b7e83f2f62ad09b2e7e115

          SHA512

          495217cc5a44df5081c5ae1b11a38bf120c34a8167dfc1d0b5c84ef5c1a437919265d53e8675e14921e2b6c4971cf3bd4c0eb2d52e33cbabf4f80bae5f1c0c00

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w83SK94.exe

          Filesize

          459KB

          MD5

          ecd5c9208701e9d74a5ad2b714155bd3

          SHA1

          27fdf77bdeabacf3fa027d3db5c6105004901f14

          SHA256

          c6fde9050eb858d97515c324565ccba43ef49bde77b7e83f2f62ad09b2e7e115

          SHA512

          495217cc5a44df5081c5ae1b11a38bf120c34a8167dfc1d0b5c84ef5c1a437919265d53e8675e14921e2b6c4971cf3bd4c0eb2d52e33cbabf4f80bae5f1c0c00

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\za915788.exe

          Filesize

          775KB

          MD5

          d2d0eb5fc1730dd8b4b5a60867ba0339

          SHA1

          57c4bbfdd19fdbe4f4f4d2fcab0196533589271e

          SHA256

          e83e740253077a2b455d22e7e580db98e4f4348ebfdc156a07b37eec30ed2e80

          SHA512

          0d647684049e910ebf6286124068071bd992374c5bd02cfe226acc9c93df8f50dc7515befa5296c16286c854585cfb93b7e7cd8ffdbbb44771457d20e229c6d0

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\za915788.exe

          Filesize

          775KB

          MD5

          d2d0eb5fc1730dd8b4b5a60867ba0339

          SHA1

          57c4bbfdd19fdbe4f4f4d2fcab0196533589271e

          SHA256

          e83e740253077a2b455d22e7e580db98e4f4348ebfdc156a07b37eec30ed2e80

          SHA512

          0d647684049e910ebf6286124068071bd992374c5bd02cfe226acc9c93df8f50dc7515befa5296c16286c854585cfb93b7e7cd8ffdbbb44771457d20e229c6d0

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\za944897.exe

          Filesize

          592KB

          MD5

          0738f122da5ea083d91a535be4d2d63a

          SHA1

          f6677a1c994047138bb8b43f5467ba3b3e7ae275

          SHA256

          5af40ba4b89f5c22aaac54abeb88611524622fee0af2b5fff821f7f12ae0d14e

          SHA512

          13f3f2d825d4271d78268dff35dfc83cade619f2c2afa5762066b5ac7fe193b6003d052eecf3a6abef01de8288fac0b20618bd1e35564cd843ec86fee79b0c5c

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\za944897.exe

          Filesize

          592KB

          MD5

          0738f122da5ea083d91a535be4d2d63a

          SHA1

          f6677a1c994047138bb8b43f5467ba3b3e7ae275

          SHA256

          5af40ba4b89f5c22aaac54abeb88611524622fee0af2b5fff821f7f12ae0d14e

          SHA512

          13f3f2d825d4271d78268dff35dfc83cade619f2c2afa5762066b5ac7fe193b6003d052eecf3a6abef01de8288fac0b20618bd1e35564cd843ec86fee79b0c5c

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\94719278.exe

          Filesize

          377KB

          MD5

          cd74bfda8a7df788c9f3421b6c810a3a

          SHA1

          7aad29ed789b32b3efa67ac5da3027597ccd19e4

          SHA256

          879ed32cf0d8c805610d6a415e272a26a31708f464f93c8e1527beb432770614

          SHA512

          d4f33cea0c460317f3c02ae54f70973687623e9ab2a9b863f5d18fe3a5380ad8a25612eacb8cb4d31e931999dddbbf37ea5c7ab926169da3ae14e80e0c8e154a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\94719278.exe

          Filesize

          377KB

          MD5

          cd74bfda8a7df788c9f3421b6c810a3a

          SHA1

          7aad29ed789b32b3efa67ac5da3027597ccd19e4

          SHA256

          879ed32cf0d8c805610d6a415e272a26a31708f464f93c8e1527beb432770614

          SHA512

          d4f33cea0c460317f3c02ae54f70973687623e9ab2a9b863f5d18fe3a5380ad8a25612eacb8cb4d31e931999dddbbf37ea5c7ab926169da3ae14e80e0c8e154a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\94719278.exe

          Filesize

          377KB

          MD5

          cd74bfda8a7df788c9f3421b6c810a3a

          SHA1

          7aad29ed789b32b3efa67ac5da3027597ccd19e4

          SHA256

          879ed32cf0d8c805610d6a415e272a26a31708f464f93c8e1527beb432770614

          SHA512

          d4f33cea0c460317f3c02ae54f70973687623e9ab2a9b863f5d18fe3a5380ad8a25612eacb8cb4d31e931999dddbbf37ea5c7ab926169da3ae14e80e0c8e154a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\w83SK94.exe

          Filesize

          459KB

          MD5

          ecd5c9208701e9d74a5ad2b714155bd3

          SHA1

          27fdf77bdeabacf3fa027d3db5c6105004901f14

          SHA256

          c6fde9050eb858d97515c324565ccba43ef49bde77b7e83f2f62ad09b2e7e115

          SHA512

          495217cc5a44df5081c5ae1b11a38bf120c34a8167dfc1d0b5c84ef5c1a437919265d53e8675e14921e2b6c4971cf3bd4c0eb2d52e33cbabf4f80bae5f1c0c00

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\w83SK94.exe

          Filesize

          459KB

          MD5

          ecd5c9208701e9d74a5ad2b714155bd3

          SHA1

          27fdf77bdeabacf3fa027d3db5c6105004901f14

          SHA256

          c6fde9050eb858d97515c324565ccba43ef49bde77b7e83f2f62ad09b2e7e115

          SHA512

          495217cc5a44df5081c5ae1b11a38bf120c34a8167dfc1d0b5c84ef5c1a437919265d53e8675e14921e2b6c4971cf3bd4c0eb2d52e33cbabf4f80bae5f1c0c00

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\w83SK94.exe

          Filesize

          459KB

          MD5

          ecd5c9208701e9d74a5ad2b714155bd3

          SHA1

          27fdf77bdeabacf3fa027d3db5c6105004901f14

          SHA256

          c6fde9050eb858d97515c324565ccba43ef49bde77b7e83f2f62ad09b2e7e115

          SHA512

          495217cc5a44df5081c5ae1b11a38bf120c34a8167dfc1d0b5c84ef5c1a437919265d53e8675e14921e2b6c4971cf3bd4c0eb2d52e33cbabf4f80bae5f1c0c00

        • memory/612-121-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/612-98-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-100-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-102-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-104-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-106-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-108-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-110-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-112-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-114-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-116-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-118-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-119-0x0000000004E70000-0x0000000004EB0000-memory.dmp

          Filesize

          256KB

        • memory/612-120-0x0000000004E70000-0x0000000004EB0000-memory.dmp

          Filesize

          256KB

        • memory/612-96-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-122-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/612-94-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-92-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-91-0x0000000002330000-0x0000000002342000-memory.dmp

          Filesize

          72KB

        • memory/612-90-0x0000000002330000-0x0000000002348000-memory.dmp

          Filesize

          96KB

        • memory/612-89-0x0000000000850000-0x000000000086A000-memory.dmp

          Filesize

          104KB

        • memory/612-88-0x00000000002D0000-0x00000000002FD000-memory.dmp

          Filesize

          180KB

        • memory/1660-134-0x0000000002570000-0x00000000025AA000-memory.dmp

          Filesize

          232KB

        • memory/1660-151-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-135-0x0000000000240000-0x0000000000286000-memory.dmp

          Filesize

          280KB

        • memory/1660-137-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-136-0x0000000004EC0000-0x0000000004F00000-memory.dmp

          Filesize

          256KB

        • memory/1660-139-0x0000000004EC0000-0x0000000004F00000-memory.dmp

          Filesize

          256KB

        • memory/1660-138-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-141-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-143-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-145-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-147-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-149-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-153-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-133-0x0000000000E00000-0x0000000000E3C000-memory.dmp

          Filesize

          240KB

        • memory/1660-155-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-159-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-157-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-161-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-163-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-165-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-167-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-171-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-169-0x0000000002570000-0x00000000025A5000-memory.dmp

          Filesize

          212KB

        • memory/1660-930-0x0000000004EC0000-0x0000000004F00000-memory.dmp

          Filesize

          256KB

        • memory/1660-932-0x0000000004EC0000-0x0000000004F00000-memory.dmp

          Filesize

          256KB

        • memory/1660-934-0x0000000004EC0000-0x0000000004F00000-memory.dmp

          Filesize

          256KB