Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:10

General

  • Target

    2eb6c2c26894452c215f0c4dc145c60f04dc9cbcd1b73ae3aea2dada78b59109.exe

  • Size

    690KB

  • MD5

    c498159ab9dc78adc254a3fbdf123c1b

  • SHA1

    bb0f2eaa238a7ab01af99522eeb24785866b276c

  • SHA256

    2eb6c2c26894452c215f0c4dc145c60f04dc9cbcd1b73ae3aea2dada78b59109

  • SHA512

    7d18539601647b72054eb50d723a6168add6660e6a6b48299c1ad9526101d12cf4caf50c0058a4a5504a319eb11148b7d2c1be2375f444b98de44c5e7687bce7

  • SSDEEP

    12288:by908KrOTHAPgY4v9vf1vwxwK7qQ0aed2ImbvfLPN:byKStBwlve2IuvTPN

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2eb6c2c26894452c215f0c4dc145c60f04dc9cbcd1b73ae3aea2dada78b59109.exe
    "C:\Users\Admin\AppData\Local\Temp\2eb6c2c26894452c215f0c4dc145c60f04dc9cbcd1b73ae3aea2dada78b59109.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165278.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165278.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39785903.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39785903.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk668798.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk668798.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1220

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165278.exe

          Filesize

          536KB

          MD5

          810c64db2b4ea78d047a569224ff3528

          SHA1

          1e5ff7ce89aa4b7221cb9703086b5c324d5a2f48

          SHA256

          95541c3076e2b46f2dc9a9ad5a42b7f6578a2dbf27cc79a6cd203a2519fe04e2

          SHA512

          8fd80f239740ef32eeaa2b628baa0404ca581532ee97f3af9797151377ac1327e536a89fb9666aa80bf619a0972bb495760e0d87b0e630f099461a191cf68fec

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165278.exe

          Filesize

          536KB

          MD5

          810c64db2b4ea78d047a569224ff3528

          SHA1

          1e5ff7ce89aa4b7221cb9703086b5c324d5a2f48

          SHA256

          95541c3076e2b46f2dc9a9ad5a42b7f6578a2dbf27cc79a6cd203a2519fe04e2

          SHA512

          8fd80f239740ef32eeaa2b628baa0404ca581532ee97f3af9797151377ac1327e536a89fb9666aa80bf619a0972bb495760e0d87b0e630f099461a191cf68fec

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39785903.exe

          Filesize

          259KB

          MD5

          5605a7d75c2cb7ed02fe105a708ed5c1

          SHA1

          6e564a816d62781b3f4da1b9a81a2a7095164f5d

          SHA256

          65accd260dcc482e7766876b17678fc3b12d917b524d7b35612b2b2db80dc24d

          SHA512

          becd25ace9c1ab69df50f058531b1c36ed3765b5230c815c1bbf7b44883caf9c781f270a9596b34fb3ce4fbf9f25303a3ac6fde4ffe0ba1bcc6e507d8c410b8c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39785903.exe

          Filesize

          259KB

          MD5

          5605a7d75c2cb7ed02fe105a708ed5c1

          SHA1

          6e564a816d62781b3f4da1b9a81a2a7095164f5d

          SHA256

          65accd260dcc482e7766876b17678fc3b12d917b524d7b35612b2b2db80dc24d

          SHA512

          becd25ace9c1ab69df50f058531b1c36ed3765b5230c815c1bbf7b44883caf9c781f270a9596b34fb3ce4fbf9f25303a3ac6fde4ffe0ba1bcc6e507d8c410b8c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39785903.exe

          Filesize

          259KB

          MD5

          5605a7d75c2cb7ed02fe105a708ed5c1

          SHA1

          6e564a816d62781b3f4da1b9a81a2a7095164f5d

          SHA256

          65accd260dcc482e7766876b17678fc3b12d917b524d7b35612b2b2db80dc24d

          SHA512

          becd25ace9c1ab69df50f058531b1c36ed3765b5230c815c1bbf7b44883caf9c781f270a9596b34fb3ce4fbf9f25303a3ac6fde4ffe0ba1bcc6e507d8c410b8c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk668798.exe

          Filesize

          341KB

          MD5

          a8b141a49bef766dd98b84afddedcba9

          SHA1

          67219eac23a5d07cf9eec1862debce8a4c1199ec

          SHA256

          864b11aa14aa61553f818a7879a74044e18c47596c950cec906c41d845516d7b

          SHA512

          a0f1dd46bc7b329b7e59c2f77b068499c3f57dd541fc6d1caa6172a819f59cbd1780955eef3d6c4a225021520f0e46a64ff69236a580fbda1d6a3233ee9af7fd

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk668798.exe

          Filesize

          341KB

          MD5

          a8b141a49bef766dd98b84afddedcba9

          SHA1

          67219eac23a5d07cf9eec1862debce8a4c1199ec

          SHA256

          864b11aa14aa61553f818a7879a74044e18c47596c950cec906c41d845516d7b

          SHA512

          a0f1dd46bc7b329b7e59c2f77b068499c3f57dd541fc6d1caa6172a819f59cbd1780955eef3d6c4a225021520f0e46a64ff69236a580fbda1d6a3233ee9af7fd

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk668798.exe

          Filesize

          341KB

          MD5

          a8b141a49bef766dd98b84afddedcba9

          SHA1

          67219eac23a5d07cf9eec1862debce8a4c1199ec

          SHA256

          864b11aa14aa61553f818a7879a74044e18c47596c950cec906c41d845516d7b

          SHA512

          a0f1dd46bc7b329b7e59c2f77b068499c3f57dd541fc6d1caa6172a819f59cbd1780955eef3d6c4a225021520f0e46a64ff69236a580fbda1d6a3233ee9af7fd

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un165278.exe

          Filesize

          536KB

          MD5

          810c64db2b4ea78d047a569224ff3528

          SHA1

          1e5ff7ce89aa4b7221cb9703086b5c324d5a2f48

          SHA256

          95541c3076e2b46f2dc9a9ad5a42b7f6578a2dbf27cc79a6cd203a2519fe04e2

          SHA512

          8fd80f239740ef32eeaa2b628baa0404ca581532ee97f3af9797151377ac1327e536a89fb9666aa80bf619a0972bb495760e0d87b0e630f099461a191cf68fec

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un165278.exe

          Filesize

          536KB

          MD5

          810c64db2b4ea78d047a569224ff3528

          SHA1

          1e5ff7ce89aa4b7221cb9703086b5c324d5a2f48

          SHA256

          95541c3076e2b46f2dc9a9ad5a42b7f6578a2dbf27cc79a6cd203a2519fe04e2

          SHA512

          8fd80f239740ef32eeaa2b628baa0404ca581532ee97f3af9797151377ac1327e536a89fb9666aa80bf619a0972bb495760e0d87b0e630f099461a191cf68fec

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\39785903.exe

          Filesize

          259KB

          MD5

          5605a7d75c2cb7ed02fe105a708ed5c1

          SHA1

          6e564a816d62781b3f4da1b9a81a2a7095164f5d

          SHA256

          65accd260dcc482e7766876b17678fc3b12d917b524d7b35612b2b2db80dc24d

          SHA512

          becd25ace9c1ab69df50f058531b1c36ed3765b5230c815c1bbf7b44883caf9c781f270a9596b34fb3ce4fbf9f25303a3ac6fde4ffe0ba1bcc6e507d8c410b8c

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\39785903.exe

          Filesize

          259KB

          MD5

          5605a7d75c2cb7ed02fe105a708ed5c1

          SHA1

          6e564a816d62781b3f4da1b9a81a2a7095164f5d

          SHA256

          65accd260dcc482e7766876b17678fc3b12d917b524d7b35612b2b2db80dc24d

          SHA512

          becd25ace9c1ab69df50f058531b1c36ed3765b5230c815c1bbf7b44883caf9c781f270a9596b34fb3ce4fbf9f25303a3ac6fde4ffe0ba1bcc6e507d8c410b8c

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\39785903.exe

          Filesize

          259KB

          MD5

          5605a7d75c2cb7ed02fe105a708ed5c1

          SHA1

          6e564a816d62781b3f4da1b9a81a2a7095164f5d

          SHA256

          65accd260dcc482e7766876b17678fc3b12d917b524d7b35612b2b2db80dc24d

          SHA512

          becd25ace9c1ab69df50f058531b1c36ed3765b5230c815c1bbf7b44883caf9c781f270a9596b34fb3ce4fbf9f25303a3ac6fde4ffe0ba1bcc6e507d8c410b8c

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk668798.exe

          Filesize

          341KB

          MD5

          a8b141a49bef766dd98b84afddedcba9

          SHA1

          67219eac23a5d07cf9eec1862debce8a4c1199ec

          SHA256

          864b11aa14aa61553f818a7879a74044e18c47596c950cec906c41d845516d7b

          SHA512

          a0f1dd46bc7b329b7e59c2f77b068499c3f57dd541fc6d1caa6172a819f59cbd1780955eef3d6c4a225021520f0e46a64ff69236a580fbda1d6a3233ee9af7fd

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk668798.exe

          Filesize

          341KB

          MD5

          a8b141a49bef766dd98b84afddedcba9

          SHA1

          67219eac23a5d07cf9eec1862debce8a4c1199ec

          SHA256

          864b11aa14aa61553f818a7879a74044e18c47596c950cec906c41d845516d7b

          SHA512

          a0f1dd46bc7b329b7e59c2f77b068499c3f57dd541fc6d1caa6172a819f59cbd1780955eef3d6c4a225021520f0e46a64ff69236a580fbda1d6a3233ee9af7fd

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk668798.exe

          Filesize

          341KB

          MD5

          a8b141a49bef766dd98b84afddedcba9

          SHA1

          67219eac23a5d07cf9eec1862debce8a4c1199ec

          SHA256

          864b11aa14aa61553f818a7879a74044e18c47596c950cec906c41d845516d7b

          SHA512

          a0f1dd46bc7b329b7e59c2f77b068499c3f57dd541fc6d1caa6172a819f59cbd1780955eef3d6c4a225021520f0e46a64ff69236a580fbda1d6a3233ee9af7fd

        • memory/1220-137-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-157-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-926-0x0000000004A60000-0x0000000004AA0000-memory.dmp

          Filesize

          256KB

        • memory/1220-925-0x0000000004A60000-0x0000000004AA0000-memory.dmp

          Filesize

          256KB

        • memory/1220-924-0x0000000004A60000-0x0000000004AA0000-memory.dmp

          Filesize

          256KB

        • memory/1220-921-0x0000000004A60000-0x0000000004AA0000-memory.dmp

          Filesize

          256KB

        • memory/1220-632-0x0000000004A60000-0x0000000004AA0000-memory.dmp

          Filesize

          256KB

        • memory/1220-630-0x0000000004A60000-0x0000000004AA0000-memory.dmp

          Filesize

          256KB

        • memory/1220-628-0x0000000004A60000-0x0000000004AA0000-memory.dmp

          Filesize

          256KB

        • memory/1220-143-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-145-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-147-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-153-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-155-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-159-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-149-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-151-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-141-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-139-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-135-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-133-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-131-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-124-0x0000000002060000-0x000000000209C000-memory.dmp

          Filesize

          240KB

        • memory/1220-123-0x00000000002A0000-0x00000000002E6000-memory.dmp

          Filesize

          280KB

        • memory/1220-125-0x0000000002360000-0x000000000239A000-memory.dmp

          Filesize

          232KB

        • memory/1220-126-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-127-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1220-129-0x0000000002360000-0x0000000002395000-memory.dmp

          Filesize

          212KB

        • memory/1832-110-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-108-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-79-0x0000000000250000-0x000000000027D000-memory.dmp

          Filesize

          180KB

        • memory/1832-82-0x0000000001DC0000-0x0000000001DD8000-memory.dmp

          Filesize

          96KB

        • memory/1832-78-0x0000000000630000-0x000000000064A000-memory.dmp

          Filesize

          104KB

        • memory/1832-83-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-84-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-112-0x0000000000400000-0x0000000000455000-memory.dmp

          Filesize

          340KB

        • memory/1832-111-0x0000000000400000-0x0000000000455000-memory.dmp

          Filesize

          340KB

        • memory/1832-106-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-81-0x0000000000870000-0x00000000008B0000-memory.dmp

          Filesize

          256KB

        • memory/1832-80-0x0000000000870000-0x00000000008B0000-memory.dmp

          Filesize

          256KB

        • memory/1832-86-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-104-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-102-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-100-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-98-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-96-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-94-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-92-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-90-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB

        • memory/1832-88-0x0000000001DC0000-0x0000000001DD3000-memory.dmp

          Filesize

          76KB