Analysis

  • max time kernel
    157s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:08

General

  • Target

    0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe

  • Size

    747KB

  • MD5

    81e00846aa9b7e0a840bea7baa201a55

  • SHA1

    c25051f8ceb8e0cc7d11f554fae6c83d84f1509f

  • SHA256

    0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7

  • SHA512

    e225e22c8d208b66cebd7151d62a60b3de3e3d9b5894589e0b340d2e4863ca02bbbff7bf40a9b94c00bbb473ef2266248ee3e12d73a2a4ade24a9e50a651bf35

  • SSDEEP

    12288:Ry90gtuUreMzP3YBilaZd/Azet5O9V7y+UyW/WvUjOGKo5Rf:RyBtuWeAPIsaZxvMV2+VtsjxK2

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe
    "C:\Users\Admin\AppData\Local\Temp\0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871922.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871922.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\64297555.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\64297555.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952299.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952299.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871922.exe

    Filesize

    593KB

    MD5

    a8a79f3f5d4dd35e8ea5c0347dffdcd6

    SHA1

    d1c3b6660235a972475ee2b70c2f597d4fca5c16

    SHA256

    a2f976f7d4359aa6db8beb24291336cfc0b5484c0f010de6d81cf2e08ec787d7

    SHA512

    27adec55f877ed6a7154eceb770a58c544fe7f11ce5156459cfda74449fd91f14d25b05a8f1083f2045cdda3fb6435a1834cf337717f204b5879283c5bd681c9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871922.exe

    Filesize

    593KB

    MD5

    a8a79f3f5d4dd35e8ea5c0347dffdcd6

    SHA1

    d1c3b6660235a972475ee2b70c2f597d4fca5c16

    SHA256

    a2f976f7d4359aa6db8beb24291336cfc0b5484c0f010de6d81cf2e08ec787d7

    SHA512

    27adec55f877ed6a7154eceb770a58c544fe7f11ce5156459cfda74449fd91f14d25b05a8f1083f2045cdda3fb6435a1834cf337717f204b5879283c5bd681c9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\64297555.exe

    Filesize

    378KB

    MD5

    3be72b7202e08d841650cf337ec68bd9

    SHA1

    ea312efe563f844156aac0b17637558435cb989d

    SHA256

    1aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700

    SHA512

    828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\64297555.exe

    Filesize

    378KB

    MD5

    3be72b7202e08d841650cf337ec68bd9

    SHA1

    ea312efe563f844156aac0b17637558435cb989d

    SHA256

    1aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700

    SHA512

    828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\64297555.exe

    Filesize

    378KB

    MD5

    3be72b7202e08d841650cf337ec68bd9

    SHA1

    ea312efe563f844156aac0b17637558435cb989d

    SHA256

    1aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700

    SHA512

    828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952299.exe

    Filesize

    460KB

    MD5

    e4c85364aa3984c1ff318f674f29ecd6

    SHA1

    36f377e17933812daedfb8093490261b8459e680

    SHA256

    6d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d

    SHA512

    c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952299.exe

    Filesize

    460KB

    MD5

    e4c85364aa3984c1ff318f674f29ecd6

    SHA1

    36f377e17933812daedfb8093490261b8459e680

    SHA256

    6d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d

    SHA512

    c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952299.exe

    Filesize

    460KB

    MD5

    e4c85364aa3984c1ff318f674f29ecd6

    SHA1

    36f377e17933812daedfb8093490261b8459e680

    SHA256

    6d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d

    SHA512

    c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un871922.exe

    Filesize

    593KB

    MD5

    a8a79f3f5d4dd35e8ea5c0347dffdcd6

    SHA1

    d1c3b6660235a972475ee2b70c2f597d4fca5c16

    SHA256

    a2f976f7d4359aa6db8beb24291336cfc0b5484c0f010de6d81cf2e08ec787d7

    SHA512

    27adec55f877ed6a7154eceb770a58c544fe7f11ce5156459cfda74449fd91f14d25b05a8f1083f2045cdda3fb6435a1834cf337717f204b5879283c5bd681c9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un871922.exe

    Filesize

    593KB

    MD5

    a8a79f3f5d4dd35e8ea5c0347dffdcd6

    SHA1

    d1c3b6660235a972475ee2b70c2f597d4fca5c16

    SHA256

    a2f976f7d4359aa6db8beb24291336cfc0b5484c0f010de6d81cf2e08ec787d7

    SHA512

    27adec55f877ed6a7154eceb770a58c544fe7f11ce5156459cfda74449fd91f14d25b05a8f1083f2045cdda3fb6435a1834cf337717f204b5879283c5bd681c9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\64297555.exe

    Filesize

    378KB

    MD5

    3be72b7202e08d841650cf337ec68bd9

    SHA1

    ea312efe563f844156aac0b17637558435cb989d

    SHA256

    1aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700

    SHA512

    828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\64297555.exe

    Filesize

    378KB

    MD5

    3be72b7202e08d841650cf337ec68bd9

    SHA1

    ea312efe563f844156aac0b17637558435cb989d

    SHA256

    1aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700

    SHA512

    828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\64297555.exe

    Filesize

    378KB

    MD5

    3be72b7202e08d841650cf337ec68bd9

    SHA1

    ea312efe563f844156aac0b17637558435cb989d

    SHA256

    1aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700

    SHA512

    828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952299.exe

    Filesize

    460KB

    MD5

    e4c85364aa3984c1ff318f674f29ecd6

    SHA1

    36f377e17933812daedfb8093490261b8459e680

    SHA256

    6d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d

    SHA512

    c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952299.exe

    Filesize

    460KB

    MD5

    e4c85364aa3984c1ff318f674f29ecd6

    SHA1

    36f377e17933812daedfb8093490261b8459e680

    SHA256

    6d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d

    SHA512

    c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952299.exe

    Filesize

    460KB

    MD5

    e4c85364aa3984c1ff318f674f29ecd6

    SHA1

    36f377e17933812daedfb8093490261b8459e680

    SHA256

    6d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d

    SHA512

    c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352

  • memory/1340-112-0x0000000000400000-0x0000000000804000-memory.dmp

    Filesize

    4.0MB

  • memory/1340-87-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-89-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-91-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-93-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-95-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-97-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-99-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-101-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-103-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-105-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-107-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-109-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-110-0x00000000008B0000-0x00000000008F0000-memory.dmp

    Filesize

    256KB

  • memory/1340-111-0x00000000008B0000-0x00000000008F0000-memory.dmp

    Filesize

    256KB

  • memory/1340-85-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-113-0x0000000000400000-0x0000000000804000-memory.dmp

    Filesize

    4.0MB

  • memory/1340-83-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-82-0x0000000000B50000-0x0000000000B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-81-0x0000000000B50000-0x0000000000B68000-memory.dmp

    Filesize

    96KB

  • memory/1340-80-0x00000000008B0000-0x00000000008F0000-memory.dmp

    Filesize

    256KB

  • memory/1340-79-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/1340-78-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/1528-124-0x00000000011A0000-0x00000000011DC000-memory.dmp

    Filesize

    240KB

  • memory/1528-125-0x00000000011E0000-0x000000000121A000-memory.dmp

    Filesize

    232KB

  • memory/1528-126-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-127-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-129-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-131-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-133-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-135-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-137-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-140-0x0000000000290000-0x00000000002D6000-memory.dmp

    Filesize

    280KB

  • memory/1528-142-0x0000000004FB0000-0x0000000004FF0000-memory.dmp

    Filesize

    256KB

  • memory/1528-143-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-139-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-145-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-147-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-149-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-151-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-153-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-155-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-157-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-159-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-161-0x00000000011E0000-0x0000000001215000-memory.dmp

    Filesize

    212KB

  • memory/1528-920-0x0000000004FB0000-0x0000000004FF0000-memory.dmp

    Filesize

    256KB

  • memory/1528-922-0x0000000004FB0000-0x0000000004FF0000-memory.dmp

    Filesize

    256KB

  • memory/1528-924-0x0000000004FB0000-0x0000000004FF0000-memory.dmp

    Filesize

    256KB