Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:20

General

  • Target

    0808a60a9b8a4fbe55a0b7d7ada72f909a0225c2c7452ea583e8e506a2bde8a9.exe

  • Size

    643KB

  • MD5

    e1268b122e981ea245e85dadaf52f39e

  • SHA1

    fabd95e3ec5274bc7f218266eafbef29e72c6845

  • SHA256

    0808a60a9b8a4fbe55a0b7d7ada72f909a0225c2c7452ea583e8e506a2bde8a9

  • SHA512

    ce27e1ec965449d419e0c0de024cbb807b814b2121f4e6acd35479f96096866c25aa8958424bf795c8bc5c76d06207283245914fa16a8ec4bd4e37aa2839cfab

  • SSDEEP

    12288:/y90qK14l8AHIrX7jSQXV8q3EuYkqtE/S+Pi1ghUrJ1:/yFMuOrlVMurqO/k1gWz

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0808a60a9b8a4fbe55a0b7d7ada72f909a0225c2c7452ea583e8e506a2bde8a9.exe
    "C:\Users\Admin\AppData\Local\Temp\0808a60a9b8a4fbe55a0b7d7ada72f909a0225c2c7452ea583e8e506a2bde8a9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st168977.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st168977.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38490887.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38490887.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st168977.exe

    Filesize

    489KB

    MD5

    0ca7f454f812f755513b69b98106ff98

    SHA1

    7b48043f65850e6576df088df5212bc0b4f377dc

    SHA256

    31cfe2045ce8ed00213ad3ac1a6811ccba85a6eaba16041516f3c1a381479cf8

    SHA512

    d637a1ded1df5576e11a1a20d88be9782d75ec26494d3d920e8f3eb975ffca0375914afb599437032f541fed10b56be9e5a0163b08647c4c0deba9fc2d81a07b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st168977.exe

    Filesize

    489KB

    MD5

    0ca7f454f812f755513b69b98106ff98

    SHA1

    7b48043f65850e6576df088df5212bc0b4f377dc

    SHA256

    31cfe2045ce8ed00213ad3ac1a6811ccba85a6eaba16041516f3c1a381479cf8

    SHA512

    d637a1ded1df5576e11a1a20d88be9782d75ec26494d3d920e8f3eb975ffca0375914afb599437032f541fed10b56be9e5a0163b08647c4c0deba9fc2d81a07b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38490887.exe

    Filesize

    175KB

    MD5

    3d10b67208452d7a91d7bd7066067676

    SHA1

    e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

    SHA256

    5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

    SHA512

    b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38490887.exe

    Filesize

    175KB

    MD5

    3d10b67208452d7a91d7bd7066067676

    SHA1

    e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

    SHA256

    5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

    SHA512

    b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe

    Filesize

    332KB

    MD5

    8ad5b2fc1e81d78cb441a2b6853e30ef

    SHA1

    337123d3217ef503cb057db3cf2a442c9e4913d4

    SHA256

    102d561bdbd8bc6cc5617bc03805cce6717ebf0e0fc3d11f82d0cf42c972a430

    SHA512

    1fb0984abeae2df58064d39734cc226708e1a058ec86f5400697ef8cdeb017f74954a3f71b8161e9ed9dc0c4ff6fcc9abc0140b19326dc8c9b96554e598affb6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe

    Filesize

    332KB

    MD5

    8ad5b2fc1e81d78cb441a2b6853e30ef

    SHA1

    337123d3217ef503cb057db3cf2a442c9e4913d4

    SHA256

    102d561bdbd8bc6cc5617bc03805cce6717ebf0e0fc3d11f82d0cf42c972a430

    SHA512

    1fb0984abeae2df58064d39734cc226708e1a058ec86f5400697ef8cdeb017f74954a3f71b8161e9ed9dc0c4ff6fcc9abc0140b19326dc8c9b96554e598affb6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe

    Filesize

    332KB

    MD5

    8ad5b2fc1e81d78cb441a2b6853e30ef

    SHA1

    337123d3217ef503cb057db3cf2a442c9e4913d4

    SHA256

    102d561bdbd8bc6cc5617bc03805cce6717ebf0e0fc3d11f82d0cf42c972a430

    SHA512

    1fb0984abeae2df58064d39734cc226708e1a058ec86f5400697ef8cdeb017f74954a3f71b8161e9ed9dc0c4ff6fcc9abc0140b19326dc8c9b96554e598affb6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st168977.exe

    Filesize

    489KB

    MD5

    0ca7f454f812f755513b69b98106ff98

    SHA1

    7b48043f65850e6576df088df5212bc0b4f377dc

    SHA256

    31cfe2045ce8ed00213ad3ac1a6811ccba85a6eaba16041516f3c1a381479cf8

    SHA512

    d637a1ded1df5576e11a1a20d88be9782d75ec26494d3d920e8f3eb975ffca0375914afb599437032f541fed10b56be9e5a0163b08647c4c0deba9fc2d81a07b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st168977.exe

    Filesize

    489KB

    MD5

    0ca7f454f812f755513b69b98106ff98

    SHA1

    7b48043f65850e6576df088df5212bc0b4f377dc

    SHA256

    31cfe2045ce8ed00213ad3ac1a6811ccba85a6eaba16041516f3c1a381479cf8

    SHA512

    d637a1ded1df5576e11a1a20d88be9782d75ec26494d3d920e8f3eb975ffca0375914afb599437032f541fed10b56be9e5a0163b08647c4c0deba9fc2d81a07b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\38490887.exe

    Filesize

    175KB

    MD5

    3d10b67208452d7a91d7bd7066067676

    SHA1

    e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

    SHA256

    5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

    SHA512

    b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\38490887.exe

    Filesize

    175KB

    MD5

    3d10b67208452d7a91d7bd7066067676

    SHA1

    e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

    SHA256

    5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

    SHA512

    b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe

    Filesize

    332KB

    MD5

    8ad5b2fc1e81d78cb441a2b6853e30ef

    SHA1

    337123d3217ef503cb057db3cf2a442c9e4913d4

    SHA256

    102d561bdbd8bc6cc5617bc03805cce6717ebf0e0fc3d11f82d0cf42c972a430

    SHA512

    1fb0984abeae2df58064d39734cc226708e1a058ec86f5400697ef8cdeb017f74954a3f71b8161e9ed9dc0c4ff6fcc9abc0140b19326dc8c9b96554e598affb6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe

    Filesize

    332KB

    MD5

    8ad5b2fc1e81d78cb441a2b6853e30ef

    SHA1

    337123d3217ef503cb057db3cf2a442c9e4913d4

    SHA256

    102d561bdbd8bc6cc5617bc03805cce6717ebf0e0fc3d11f82d0cf42c972a430

    SHA512

    1fb0984abeae2df58064d39734cc226708e1a058ec86f5400697ef8cdeb017f74954a3f71b8161e9ed9dc0c4ff6fcc9abc0140b19326dc8c9b96554e598affb6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe

    Filesize

    332KB

    MD5

    8ad5b2fc1e81d78cb441a2b6853e30ef

    SHA1

    337123d3217ef503cb057db3cf2a442c9e4913d4

    SHA256

    102d561bdbd8bc6cc5617bc03805cce6717ebf0e0fc3d11f82d0cf42c972a430

    SHA512

    1fb0984abeae2df58064d39734cc226708e1a058ec86f5400697ef8cdeb017f74954a3f71b8161e9ed9dc0c4ff6fcc9abc0140b19326dc8c9b96554e598affb6

  • memory/1432-137-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-143-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-917-0x0000000007110000-0x0000000007150000-memory.dmp

    Filesize

    256KB

  • memory/1432-916-0x0000000007110000-0x0000000007150000-memory.dmp

    Filesize

    256KB

  • memory/1432-913-0x0000000007110000-0x0000000007150000-memory.dmp

    Filesize

    256KB

  • memory/1432-510-0x0000000007110000-0x0000000007150000-memory.dmp

    Filesize

    256KB

  • memory/1432-507-0x0000000007110000-0x0000000007150000-memory.dmp

    Filesize

    256KB

  • memory/1432-505-0x0000000002F40000-0x0000000002F86000-memory.dmp

    Filesize

    280KB

  • memory/1432-153-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-151-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-149-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-147-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-145-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-141-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-139-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-135-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-133-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-131-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-129-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-116-0x0000000004930000-0x000000000496C000-memory.dmp

    Filesize

    240KB

  • memory/1432-117-0x0000000004970000-0x00000000049AA000-memory.dmp

    Filesize

    232KB

  • memory/1432-119-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-118-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-121-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-123-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-125-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1432-127-0x0000000004970000-0x00000000049A5000-memory.dmp

    Filesize

    212KB

  • memory/1712-104-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/1712-101-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-75-0x0000000000B00000-0x0000000000B18000-memory.dmp

    Filesize

    96KB

  • memory/1712-79-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-74-0x0000000000440000-0x000000000045A000-memory.dmp

    Filesize

    104KB

  • memory/1712-81-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-89-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-93-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-77-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-76-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-85-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-83-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-87-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-91-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-95-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-97-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-99-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-103-0x0000000000B00000-0x0000000000B13000-memory.dmp

    Filesize

    76KB

  • memory/1712-105-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB