Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:12

General

  • Target

    02a95b4835016a5f0cb57e1429569bfa.exe

  • Size

    747KB

  • MD5

    02a95b4835016a5f0cb57e1429569bfa

  • SHA1

    a6cc2171275faafa07b71ed1f05d69e459de4ec2

  • SHA256

    8e1fde8738b3f83e7e01465a26d198229055664810dcc2342ed53771d6898b9f

  • SHA512

    02237be0baf5d7428d727ac208d5bbcdda2e7647dc59326486c495f719cf82ccca5c62a3187438b2c952bc13396296b819345a0fcae6a3ced2855f11acb275a3

  • SSDEEP

    12288:vy90AYpyJiVwF2vW1Gutmz6bGJM1NcU7NYpuDED2Rbe4wVTa4DF:vyAyN2vGbmwATU7NK0ocbeZVmS

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02a95b4835016a5f0cb57e1429569bfa.exe
    "C:\Users\Admin\AppData\Local\Temp\02a95b4835016a5f0cb57e1429569bfa.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1332

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe

    Filesize

    593KB

    MD5

    bcadaab56887edc3b504f754c470a9f5

    SHA1

    89c7fc90796c51fd93431ca7fd717d8647dce196

    SHA256

    c699568d9c14b5741b9b2b7f3fb949757d548647eae0dc82fa8c766a655fc26d

    SHA512

    9e30024de0e419d3589544efa40c680d2d65e7acf3476fa5ea28ce9986dc42a0260f0a61436badaaebab6a505c0e7be9295ecac54cba78bec828d6dec50f09ef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe

    Filesize

    593KB

    MD5

    bcadaab56887edc3b504f754c470a9f5

    SHA1

    89c7fc90796c51fd93431ca7fd717d8647dce196

    SHA256

    c699568d9c14b5741b9b2b7f3fb949757d548647eae0dc82fa8c766a655fc26d

    SHA512

    9e30024de0e419d3589544efa40c680d2d65e7acf3476fa5ea28ce9986dc42a0260f0a61436badaaebab6a505c0e7be9295ecac54cba78bec828d6dec50f09ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe

    Filesize

    377KB

    MD5

    dd629787aa53b50aaecf9c60673df001

    SHA1

    cd707ffdd60442422e0f156c91982efa1c5e6bfa

    SHA256

    770196f67910e5a1b2cbb1c666f67801714e41d14cfead27933bde2033faee56

    SHA512

    e129e9197828f9c91df75c9a042c8b82d9231f4c43e1363c0e2d3a0cafbe27de4faba7fbf5e1da31a91bc68beda956a84ec426910732bcab065012baa5abe91f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe

    Filesize

    377KB

    MD5

    dd629787aa53b50aaecf9c60673df001

    SHA1

    cd707ffdd60442422e0f156c91982efa1c5e6bfa

    SHA256

    770196f67910e5a1b2cbb1c666f67801714e41d14cfead27933bde2033faee56

    SHA512

    e129e9197828f9c91df75c9a042c8b82d9231f4c43e1363c0e2d3a0cafbe27de4faba7fbf5e1da31a91bc68beda956a84ec426910732bcab065012baa5abe91f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe

    Filesize

    377KB

    MD5

    dd629787aa53b50aaecf9c60673df001

    SHA1

    cd707ffdd60442422e0f156c91982efa1c5e6bfa

    SHA256

    770196f67910e5a1b2cbb1c666f67801714e41d14cfead27933bde2033faee56

    SHA512

    e129e9197828f9c91df75c9a042c8b82d9231f4c43e1363c0e2d3a0cafbe27de4faba7fbf5e1da31a91bc68beda956a84ec426910732bcab065012baa5abe91f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe

    Filesize

    459KB

    MD5

    7dbc69b825d5f6410689926e5ec28a18

    SHA1

    71648a55f9d03112f83ba267c32b1cc430859b25

    SHA256

    6acab6957ebb088ad5ba74495cbb795c5fc44c5bc015d04dd8199d41bde5f173

    SHA512

    011566ffd0fe574d3405bb56bf605a8e6e4d2918ca5be4ffbb0e2592e56cd596e6e73cc0925b3326378f469bb7d0e97c36dc4ed6ac30071d63a83db8dda96f74

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe

    Filesize

    459KB

    MD5

    7dbc69b825d5f6410689926e5ec28a18

    SHA1

    71648a55f9d03112f83ba267c32b1cc430859b25

    SHA256

    6acab6957ebb088ad5ba74495cbb795c5fc44c5bc015d04dd8199d41bde5f173

    SHA512

    011566ffd0fe574d3405bb56bf605a8e6e4d2918ca5be4ffbb0e2592e56cd596e6e73cc0925b3326378f469bb7d0e97c36dc4ed6ac30071d63a83db8dda96f74

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe

    Filesize

    459KB

    MD5

    7dbc69b825d5f6410689926e5ec28a18

    SHA1

    71648a55f9d03112f83ba267c32b1cc430859b25

    SHA256

    6acab6957ebb088ad5ba74495cbb795c5fc44c5bc015d04dd8199d41bde5f173

    SHA512

    011566ffd0fe574d3405bb56bf605a8e6e4d2918ca5be4ffbb0e2592e56cd596e6e73cc0925b3326378f469bb7d0e97c36dc4ed6ac30071d63a83db8dda96f74

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe

    Filesize

    593KB

    MD5

    bcadaab56887edc3b504f754c470a9f5

    SHA1

    89c7fc90796c51fd93431ca7fd717d8647dce196

    SHA256

    c699568d9c14b5741b9b2b7f3fb949757d548647eae0dc82fa8c766a655fc26d

    SHA512

    9e30024de0e419d3589544efa40c680d2d65e7acf3476fa5ea28ce9986dc42a0260f0a61436badaaebab6a505c0e7be9295ecac54cba78bec828d6dec50f09ef

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe

    Filesize

    593KB

    MD5

    bcadaab56887edc3b504f754c470a9f5

    SHA1

    89c7fc90796c51fd93431ca7fd717d8647dce196

    SHA256

    c699568d9c14b5741b9b2b7f3fb949757d548647eae0dc82fa8c766a655fc26d

    SHA512

    9e30024de0e419d3589544efa40c680d2d65e7acf3476fa5ea28ce9986dc42a0260f0a61436badaaebab6a505c0e7be9295ecac54cba78bec828d6dec50f09ef

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe

    Filesize

    377KB

    MD5

    dd629787aa53b50aaecf9c60673df001

    SHA1

    cd707ffdd60442422e0f156c91982efa1c5e6bfa

    SHA256

    770196f67910e5a1b2cbb1c666f67801714e41d14cfead27933bde2033faee56

    SHA512

    e129e9197828f9c91df75c9a042c8b82d9231f4c43e1363c0e2d3a0cafbe27de4faba7fbf5e1da31a91bc68beda956a84ec426910732bcab065012baa5abe91f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe

    Filesize

    377KB

    MD5

    dd629787aa53b50aaecf9c60673df001

    SHA1

    cd707ffdd60442422e0f156c91982efa1c5e6bfa

    SHA256

    770196f67910e5a1b2cbb1c666f67801714e41d14cfead27933bde2033faee56

    SHA512

    e129e9197828f9c91df75c9a042c8b82d9231f4c43e1363c0e2d3a0cafbe27de4faba7fbf5e1da31a91bc68beda956a84ec426910732bcab065012baa5abe91f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe

    Filesize

    377KB

    MD5

    dd629787aa53b50aaecf9c60673df001

    SHA1

    cd707ffdd60442422e0f156c91982efa1c5e6bfa

    SHA256

    770196f67910e5a1b2cbb1c666f67801714e41d14cfead27933bde2033faee56

    SHA512

    e129e9197828f9c91df75c9a042c8b82d9231f4c43e1363c0e2d3a0cafbe27de4faba7fbf5e1da31a91bc68beda956a84ec426910732bcab065012baa5abe91f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe

    Filesize

    459KB

    MD5

    7dbc69b825d5f6410689926e5ec28a18

    SHA1

    71648a55f9d03112f83ba267c32b1cc430859b25

    SHA256

    6acab6957ebb088ad5ba74495cbb795c5fc44c5bc015d04dd8199d41bde5f173

    SHA512

    011566ffd0fe574d3405bb56bf605a8e6e4d2918ca5be4ffbb0e2592e56cd596e6e73cc0925b3326378f469bb7d0e97c36dc4ed6ac30071d63a83db8dda96f74

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe

    Filesize

    459KB

    MD5

    7dbc69b825d5f6410689926e5ec28a18

    SHA1

    71648a55f9d03112f83ba267c32b1cc430859b25

    SHA256

    6acab6957ebb088ad5ba74495cbb795c5fc44c5bc015d04dd8199d41bde5f173

    SHA512

    011566ffd0fe574d3405bb56bf605a8e6e4d2918ca5be4ffbb0e2592e56cd596e6e73cc0925b3326378f469bb7d0e97c36dc4ed6ac30071d63a83db8dda96f74

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe

    Filesize

    459KB

    MD5

    7dbc69b825d5f6410689926e5ec28a18

    SHA1

    71648a55f9d03112f83ba267c32b1cc430859b25

    SHA256

    6acab6957ebb088ad5ba74495cbb795c5fc44c5bc015d04dd8199d41bde5f173

    SHA512

    011566ffd0fe574d3405bb56bf605a8e6e4d2918ca5be4ffbb0e2592e56cd596e6e73cc0925b3326378f469bb7d0e97c36dc4ed6ac30071d63a83db8dda96f74

  • memory/976-108-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/976-87-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-89-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-91-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-93-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-95-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-97-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-99-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-101-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-103-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-105-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-107-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-109-0x0000000004DC0000-0x0000000004E00000-memory.dmp

    Filesize

    256KB

  • memory/976-110-0x0000000004DC0000-0x0000000004E00000-memory.dmp

    Filesize

    256KB

  • memory/976-85-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-111-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/976-83-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-81-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-80-0x00000000008E0000-0x00000000008F2000-memory.dmp

    Filesize

    72KB

  • memory/976-79-0x00000000008E0000-0x00000000008F8000-memory.dmp

    Filesize

    96KB

  • memory/976-78-0x0000000000810000-0x000000000082A000-memory.dmp

    Filesize

    104KB

  • memory/976-114-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1332-126-0x0000000002480000-0x00000000024BA000-memory.dmp

    Filesize

    232KB

  • memory/1332-144-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-127-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-128-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-130-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-132-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-134-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-136-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-138-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-140-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-142-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-125-0x0000000000F50000-0x0000000000F8C000-memory.dmp

    Filesize

    240KB

  • memory/1332-146-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-148-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-150-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-152-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-154-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-156-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-158-0x0000000002480000-0x00000000024B5000-memory.dmp

    Filesize

    212KB

  • memory/1332-286-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/1332-288-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB

  • memory/1332-921-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB

  • memory/1332-924-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB