Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:23

General

  • Target

    0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe

  • Size

    747KB

  • MD5

    e6637f1ebdb3a5c4daa346526d370a02

  • SHA1

    9daba6a073598fda16f75a30363f44c7d6dbadef

  • SHA256

    0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069

  • SHA512

    e6617b356ec9fde069b31f9edc1bcd6c19a83f4028611444be4717ea003615295a43cd5b0da638dfbd54b987205a31fc6b491854314ded1782b13a9449bab8ce

  • SSDEEP

    12288:Cy90s+m/eMwlLt5bTq95SweFFAUAGyCSzafDnHltwEH:Cyr/Un1G99VzOb82

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe
    "C:\Users\Admin\AppData\Local\Temp\0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684523.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684523.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98552496.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98552496.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680708.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680708.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684523.exe

    Filesize

    592KB

    MD5

    7f88755be992cf9de99a0b1dcc63ddd2

    SHA1

    ea498aea45df90fefa816fd66a9f09fb6353ed12

    SHA256

    0f68733e5ac2f3416f22b542e587c7c176e3a6ed3315b00c87453a24aeb3240a

    SHA512

    06996ac45d01c1acbb988b3c9ba54a242a5630b97056aa7198c30466cc9f794b705ab74574f6c00d032d032995d5a916c782aa11dc9af629d8173d6dee7b9ccd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684523.exe

    Filesize

    592KB

    MD5

    7f88755be992cf9de99a0b1dcc63ddd2

    SHA1

    ea498aea45df90fefa816fd66a9f09fb6353ed12

    SHA256

    0f68733e5ac2f3416f22b542e587c7c176e3a6ed3315b00c87453a24aeb3240a

    SHA512

    06996ac45d01c1acbb988b3c9ba54a242a5630b97056aa7198c30466cc9f794b705ab74574f6c00d032d032995d5a916c782aa11dc9af629d8173d6dee7b9ccd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98552496.exe

    Filesize

    377KB

    MD5

    d04a92e893cb4daed583aa057e4e2b57

    SHA1

    a962fb837d6b02b69c81d3e9f05a78ec75b77aa1

    SHA256

    ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8

    SHA512

    990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98552496.exe

    Filesize

    377KB

    MD5

    d04a92e893cb4daed583aa057e4e2b57

    SHA1

    a962fb837d6b02b69c81d3e9f05a78ec75b77aa1

    SHA256

    ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8

    SHA512

    990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98552496.exe

    Filesize

    377KB

    MD5

    d04a92e893cb4daed583aa057e4e2b57

    SHA1

    a962fb837d6b02b69c81d3e9f05a78ec75b77aa1

    SHA256

    ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8

    SHA512

    990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680708.exe

    Filesize

    459KB

    MD5

    93a6b72ea793f1093365b93644017cfe

    SHA1

    295d0803fc3bb5d72fd61a1dae2766baa61a3630

    SHA256

    8d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b

    SHA512

    166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680708.exe

    Filesize

    459KB

    MD5

    93a6b72ea793f1093365b93644017cfe

    SHA1

    295d0803fc3bb5d72fd61a1dae2766baa61a3630

    SHA256

    8d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b

    SHA512

    166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680708.exe

    Filesize

    459KB

    MD5

    93a6b72ea793f1093365b93644017cfe

    SHA1

    295d0803fc3bb5d72fd61a1dae2766baa61a3630

    SHA256

    8d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b

    SHA512

    166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un684523.exe

    Filesize

    592KB

    MD5

    7f88755be992cf9de99a0b1dcc63ddd2

    SHA1

    ea498aea45df90fefa816fd66a9f09fb6353ed12

    SHA256

    0f68733e5ac2f3416f22b542e587c7c176e3a6ed3315b00c87453a24aeb3240a

    SHA512

    06996ac45d01c1acbb988b3c9ba54a242a5630b97056aa7198c30466cc9f794b705ab74574f6c00d032d032995d5a916c782aa11dc9af629d8173d6dee7b9ccd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un684523.exe

    Filesize

    592KB

    MD5

    7f88755be992cf9de99a0b1dcc63ddd2

    SHA1

    ea498aea45df90fefa816fd66a9f09fb6353ed12

    SHA256

    0f68733e5ac2f3416f22b542e587c7c176e3a6ed3315b00c87453a24aeb3240a

    SHA512

    06996ac45d01c1acbb988b3c9ba54a242a5630b97056aa7198c30466cc9f794b705ab74574f6c00d032d032995d5a916c782aa11dc9af629d8173d6dee7b9ccd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\98552496.exe

    Filesize

    377KB

    MD5

    d04a92e893cb4daed583aa057e4e2b57

    SHA1

    a962fb837d6b02b69c81d3e9f05a78ec75b77aa1

    SHA256

    ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8

    SHA512

    990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\98552496.exe

    Filesize

    377KB

    MD5

    d04a92e893cb4daed583aa057e4e2b57

    SHA1

    a962fb837d6b02b69c81d3e9f05a78ec75b77aa1

    SHA256

    ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8

    SHA512

    990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\98552496.exe

    Filesize

    377KB

    MD5

    d04a92e893cb4daed583aa057e4e2b57

    SHA1

    a962fb837d6b02b69c81d3e9f05a78ec75b77aa1

    SHA256

    ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8

    SHA512

    990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680708.exe

    Filesize

    459KB

    MD5

    93a6b72ea793f1093365b93644017cfe

    SHA1

    295d0803fc3bb5d72fd61a1dae2766baa61a3630

    SHA256

    8d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b

    SHA512

    166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680708.exe

    Filesize

    459KB

    MD5

    93a6b72ea793f1093365b93644017cfe

    SHA1

    295d0803fc3bb5d72fd61a1dae2766baa61a3630

    SHA256

    8d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b

    SHA512

    166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680708.exe

    Filesize

    459KB

    MD5

    93a6b72ea793f1093365b93644017cfe

    SHA1

    295d0803fc3bb5d72fd61a1dae2766baa61a3630

    SHA256

    8d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b

    SHA512

    166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4

  • memory/1600-152-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-135-0x00000000029C0000-0x0000000002A00000-memory.dmp

    Filesize

    256KB

  • memory/1600-156-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-154-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-129-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-150-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-148-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-146-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-144-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-142-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-140-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-137-0x00000000029C0000-0x0000000002A00000-memory.dmp

    Filesize

    256KB

  • memory/1600-138-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-158-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-133-0x0000000000B70000-0x0000000000BB6000-memory.dmp

    Filesize

    280KB

  • memory/1600-134-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-131-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-160-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-162-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-921-0x00000000029C0000-0x0000000002A00000-memory.dmp

    Filesize

    256KB

  • memory/1600-923-0x00000000029C0000-0x0000000002A00000-memory.dmp

    Filesize

    256KB

  • memory/1600-924-0x00000000029C0000-0x0000000002A00000-memory.dmp

    Filesize

    256KB

  • memory/1600-926-0x00000000029C0000-0x0000000002A00000-memory.dmp

    Filesize

    256KB

  • memory/1600-124-0x00000000027C0000-0x00000000027FC000-memory.dmp

    Filesize

    240KB

  • memory/1600-125-0x0000000002950000-0x000000000298A000-memory.dmp

    Filesize

    232KB

  • memory/1600-126-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1600-127-0x0000000002950000-0x0000000002985000-memory.dmp

    Filesize

    212KB

  • memory/1736-85-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-113-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1736-112-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1736-111-0x0000000004F70000-0x0000000004FB0000-memory.dmp

    Filesize

    256KB

  • memory/1736-110-0x0000000004F70000-0x0000000004FB0000-memory.dmp

    Filesize

    256KB

  • memory/1736-109-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-107-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-105-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-103-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-101-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-97-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-99-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-93-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-95-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-91-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-89-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-87-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-83-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-82-0x00000000008B0000-0x00000000008C2000-memory.dmp

    Filesize

    72KB

  • memory/1736-81-0x00000000008B0000-0x00000000008C8000-memory.dmp

    Filesize

    96KB

  • memory/1736-80-0x0000000004F70000-0x0000000004FB0000-memory.dmp

    Filesize

    256KB

  • memory/1736-79-0x0000000000300000-0x000000000032D000-memory.dmp

    Filesize

    180KB

  • memory/1736-78-0x0000000000850000-0x000000000086A000-memory.dmp

    Filesize

    104KB