Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:11

General

  • Target

    01ef559f8cd208bde7d0e2bef98f305d8d31d45dc57d4dd949e97039bcc61273.exe

  • Size

    693KB

  • MD5

    6e07bcda708771866c5a231da0743c9d

  • SHA1

    72c686c8d62942905424c941cd6a6cfe207eaf60

  • SHA256

    01ef559f8cd208bde7d0e2bef98f305d8d31d45dc57d4dd949e97039bcc61273

  • SHA512

    f304375d45e7dbcda3a3ae34225457cb6c04fc1fe481bbc0efcfb36d88451af2556ef9c4e5e1825eadf96681624c5227a07401441223695ef67dd21b91d17f17

  • SSDEEP

    12288:5y90pka9dsvKrW4jU1okP4UaYjgFGiklGl0hEz7w85GCJM0ILw:5y/Gbi4j3LAhikkShs76CJM3w

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01ef559f8cd208bde7d0e2bef98f305d8d31d45dc57d4dd949e97039bcc61273.exe
    "C:\Users\Admin\AppData\Local\Temp\01ef559f8cd208bde7d0e2bef98f305d8d31d45dc57d4dd949e97039bcc61273.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un200039.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un200039.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59831416.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59831416.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk620102.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk620102.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1104

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un200039.exe

          Filesize

          540KB

          MD5

          99d6629b0379ef6d0e7249eddef1961c

          SHA1

          37538dd1207aec27932436acd8da5464d383ba72

          SHA256

          d4b4dc98057c5e71a675e7d12766ce1cf5f26c6d77de337331262dcc0a080242

          SHA512

          9727d3f263030ea507e6ae3a1cea3b8dcc2cb2076ca88d6d60c75d687e35ec2ffcfc5d0b4338876f88c0d60a3f69d30731e167fb6012fe6ae7e7d4fba8f65827

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un200039.exe

          Filesize

          540KB

          MD5

          99d6629b0379ef6d0e7249eddef1961c

          SHA1

          37538dd1207aec27932436acd8da5464d383ba72

          SHA256

          d4b4dc98057c5e71a675e7d12766ce1cf5f26c6d77de337331262dcc0a080242

          SHA512

          9727d3f263030ea507e6ae3a1cea3b8dcc2cb2076ca88d6d60c75d687e35ec2ffcfc5d0b4338876f88c0d60a3f69d30731e167fb6012fe6ae7e7d4fba8f65827

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59831416.exe

          Filesize

          258KB

          MD5

          a38885d42e67fa4cc4de6e2846e470c6

          SHA1

          212f2cc450ae241ddfc788a39d1cc4dbb5f36058

          SHA256

          78bd8b93e362851e3a7b71b59b6af16c9bda76efb8f58de7dd29072542b32f84

          SHA512

          bf98dd8579b1e1becf2b5925ff0543012d31b983069580be32c74b9d8ec105aee300588ea956417325664e62f69c2f5a7e2d75b10920f7272c6d93af5e5d5f66

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59831416.exe

          Filesize

          258KB

          MD5

          a38885d42e67fa4cc4de6e2846e470c6

          SHA1

          212f2cc450ae241ddfc788a39d1cc4dbb5f36058

          SHA256

          78bd8b93e362851e3a7b71b59b6af16c9bda76efb8f58de7dd29072542b32f84

          SHA512

          bf98dd8579b1e1becf2b5925ff0543012d31b983069580be32c74b9d8ec105aee300588ea956417325664e62f69c2f5a7e2d75b10920f7272c6d93af5e5d5f66

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\59831416.exe

          Filesize

          258KB

          MD5

          a38885d42e67fa4cc4de6e2846e470c6

          SHA1

          212f2cc450ae241ddfc788a39d1cc4dbb5f36058

          SHA256

          78bd8b93e362851e3a7b71b59b6af16c9bda76efb8f58de7dd29072542b32f84

          SHA512

          bf98dd8579b1e1becf2b5925ff0543012d31b983069580be32c74b9d8ec105aee300588ea956417325664e62f69c2f5a7e2d75b10920f7272c6d93af5e5d5f66

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk620102.exe

          Filesize

          340KB

          MD5

          c7798df9aae71fd6a37cb88e36640697

          SHA1

          c446b0d8d37bd7988d0f7a84c4e65f850ac57993

          SHA256

          9ea26fd4f850e60f478ca684d0d456d845b4e319429ee77a70b512308dbab1cf

          SHA512

          709fd02cd860c06f35e6d803b2b8ed76dbeeff4b010595bb4b534572d35dfde383ccff1cafa18953c2953016b4ff8396fc45d75fe4f23325d28147600b5d720a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk620102.exe

          Filesize

          340KB

          MD5

          c7798df9aae71fd6a37cb88e36640697

          SHA1

          c446b0d8d37bd7988d0f7a84c4e65f850ac57993

          SHA256

          9ea26fd4f850e60f478ca684d0d456d845b4e319429ee77a70b512308dbab1cf

          SHA512

          709fd02cd860c06f35e6d803b2b8ed76dbeeff4b010595bb4b534572d35dfde383ccff1cafa18953c2953016b4ff8396fc45d75fe4f23325d28147600b5d720a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk620102.exe

          Filesize

          340KB

          MD5

          c7798df9aae71fd6a37cb88e36640697

          SHA1

          c446b0d8d37bd7988d0f7a84c4e65f850ac57993

          SHA256

          9ea26fd4f850e60f478ca684d0d456d845b4e319429ee77a70b512308dbab1cf

          SHA512

          709fd02cd860c06f35e6d803b2b8ed76dbeeff4b010595bb4b534572d35dfde383ccff1cafa18953c2953016b4ff8396fc45d75fe4f23325d28147600b5d720a

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un200039.exe

          Filesize

          540KB

          MD5

          99d6629b0379ef6d0e7249eddef1961c

          SHA1

          37538dd1207aec27932436acd8da5464d383ba72

          SHA256

          d4b4dc98057c5e71a675e7d12766ce1cf5f26c6d77de337331262dcc0a080242

          SHA512

          9727d3f263030ea507e6ae3a1cea3b8dcc2cb2076ca88d6d60c75d687e35ec2ffcfc5d0b4338876f88c0d60a3f69d30731e167fb6012fe6ae7e7d4fba8f65827

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un200039.exe

          Filesize

          540KB

          MD5

          99d6629b0379ef6d0e7249eddef1961c

          SHA1

          37538dd1207aec27932436acd8da5464d383ba72

          SHA256

          d4b4dc98057c5e71a675e7d12766ce1cf5f26c6d77de337331262dcc0a080242

          SHA512

          9727d3f263030ea507e6ae3a1cea3b8dcc2cb2076ca88d6d60c75d687e35ec2ffcfc5d0b4338876f88c0d60a3f69d30731e167fb6012fe6ae7e7d4fba8f65827

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\59831416.exe

          Filesize

          258KB

          MD5

          a38885d42e67fa4cc4de6e2846e470c6

          SHA1

          212f2cc450ae241ddfc788a39d1cc4dbb5f36058

          SHA256

          78bd8b93e362851e3a7b71b59b6af16c9bda76efb8f58de7dd29072542b32f84

          SHA512

          bf98dd8579b1e1becf2b5925ff0543012d31b983069580be32c74b9d8ec105aee300588ea956417325664e62f69c2f5a7e2d75b10920f7272c6d93af5e5d5f66

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\59831416.exe

          Filesize

          258KB

          MD5

          a38885d42e67fa4cc4de6e2846e470c6

          SHA1

          212f2cc450ae241ddfc788a39d1cc4dbb5f36058

          SHA256

          78bd8b93e362851e3a7b71b59b6af16c9bda76efb8f58de7dd29072542b32f84

          SHA512

          bf98dd8579b1e1becf2b5925ff0543012d31b983069580be32c74b9d8ec105aee300588ea956417325664e62f69c2f5a7e2d75b10920f7272c6d93af5e5d5f66

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\59831416.exe

          Filesize

          258KB

          MD5

          a38885d42e67fa4cc4de6e2846e470c6

          SHA1

          212f2cc450ae241ddfc788a39d1cc4dbb5f36058

          SHA256

          78bd8b93e362851e3a7b71b59b6af16c9bda76efb8f58de7dd29072542b32f84

          SHA512

          bf98dd8579b1e1becf2b5925ff0543012d31b983069580be32c74b9d8ec105aee300588ea956417325664e62f69c2f5a7e2d75b10920f7272c6d93af5e5d5f66

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk620102.exe

          Filesize

          340KB

          MD5

          c7798df9aae71fd6a37cb88e36640697

          SHA1

          c446b0d8d37bd7988d0f7a84c4e65f850ac57993

          SHA256

          9ea26fd4f850e60f478ca684d0d456d845b4e319429ee77a70b512308dbab1cf

          SHA512

          709fd02cd860c06f35e6d803b2b8ed76dbeeff4b010595bb4b534572d35dfde383ccff1cafa18953c2953016b4ff8396fc45d75fe4f23325d28147600b5d720a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk620102.exe

          Filesize

          340KB

          MD5

          c7798df9aae71fd6a37cb88e36640697

          SHA1

          c446b0d8d37bd7988d0f7a84c4e65f850ac57993

          SHA256

          9ea26fd4f850e60f478ca684d0d456d845b4e319429ee77a70b512308dbab1cf

          SHA512

          709fd02cd860c06f35e6d803b2b8ed76dbeeff4b010595bb4b534572d35dfde383ccff1cafa18953c2953016b4ff8396fc45d75fe4f23325d28147600b5d720a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk620102.exe

          Filesize

          340KB

          MD5

          c7798df9aae71fd6a37cb88e36640697

          SHA1

          c446b0d8d37bd7988d0f7a84c4e65f850ac57993

          SHA256

          9ea26fd4f850e60f478ca684d0d456d845b4e319429ee77a70b512308dbab1cf

          SHA512

          709fd02cd860c06f35e6d803b2b8ed76dbeeff4b010595bb4b534572d35dfde383ccff1cafa18953c2953016b4ff8396fc45d75fe4f23325d28147600b5d720a

        • memory/1008-104-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-86-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-88-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-90-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-92-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-94-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-96-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-98-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-102-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-100-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-106-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-112-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-110-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-108-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-85-0x0000000004760000-0x0000000004773000-memory.dmp

          Filesize

          76KB

        • memory/1008-114-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/1008-83-0x0000000004760000-0x0000000004778000-memory.dmp

          Filesize

          96KB

        • memory/1008-82-0x0000000007270000-0x00000000072B0000-memory.dmp

          Filesize

          256KB

        • memory/1008-81-0x0000000007270000-0x00000000072B0000-memory.dmp

          Filesize

          256KB

        • memory/1008-80-0x00000000003D0000-0x00000000003EA000-memory.dmp

          Filesize

          104KB

        • memory/1008-79-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/1008-78-0x0000000000240000-0x000000000026D000-memory.dmp

          Filesize

          180KB

        • memory/1104-126-0x0000000004710000-0x000000000474A000-memory.dmp

          Filesize

          232KB

        • memory/1104-144-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-127-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-128-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-130-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-132-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-134-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-136-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-138-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-140-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-142-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-125-0x00000000046C0000-0x00000000046FC000-memory.dmp

          Filesize

          240KB

        • memory/1104-146-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-148-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-150-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-152-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-154-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-156-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-158-0x0000000004710000-0x0000000004745000-memory.dmp

          Filesize

          212KB

        • memory/1104-588-0x0000000002FB0000-0x0000000002FF6000-memory.dmp

          Filesize

          280KB

        • memory/1104-590-0x0000000007260000-0x00000000072A0000-memory.dmp

          Filesize

          256KB

        • memory/1104-592-0x0000000007260000-0x00000000072A0000-memory.dmp

          Filesize

          256KB

        • memory/1104-922-0x0000000007260000-0x00000000072A0000-memory.dmp

          Filesize

          256KB

        • memory/1104-925-0x0000000007260000-0x00000000072A0000-memory.dmp

          Filesize

          256KB