Analysis

  • max time kernel
    149s
  • max time network
    199s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:20

General

  • Target

    36614f2baf79114d8728bd29bc594cd83c75be9f0156a1e3798e609b8711c24c.exe

  • Size

    1.5MB

  • MD5

    68c5fadf43e9b0e8f1da5f788d30e8e4

  • SHA1

    29ef66ac8d2f8ef38e289e60ee6bc0703c793a75

  • SHA256

    36614f2baf79114d8728bd29bc594cd83c75be9f0156a1e3798e609b8711c24c

  • SHA512

    281b220e9ecb72790822b0cfcbbd942bf9617cd81dcd7846b2ba502c0886e233fdb026af862980e3a0e468d4e03682d524044c84155943e9242f4ad7a9102fdd

  • SSDEEP

    24576:yyt8H9y7Cb8iJETHCDau32F6/Blj+rh2GNvzZwJzEzjLzZ8shZBZhNGg9o:ZBCoiJasau31/BOtiJzEnVZBZh

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36614f2baf79114d8728bd29bc594cd83c75be9f0156a1e3798e609b8711c24c.exe
    "C:\Users\Admin\AppData\Local\Temp\36614f2baf79114d8728bd29bc594cd83c75be9f0156a1e3798e609b8711c24c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2589677.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2589677.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5431225.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5431225.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:792
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0356045.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0356045.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9874906.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9874906.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:816
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2627349.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2627349.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:784
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8839101.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8839101.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:984

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2589677.exe

          Filesize

          1.4MB

          MD5

          746e9f69407a5a0aa40df43add996aee

          SHA1

          48730c0b444c792fa3a9bb2e4173904b392a4c8a

          SHA256

          f74aff5fde604ba9819451ee5011f398a486856d79bb978ab24ce9b62e452ae9

          SHA512

          a67fd383d7f41a030ad5049442efa7a24b422f7353decffe007b08bbaf685e8934ab882dbabc1e1c73ca90330f215d469d25ae490b087fc9f8c63c7c21567ac1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2589677.exe

          Filesize

          1.4MB

          MD5

          746e9f69407a5a0aa40df43add996aee

          SHA1

          48730c0b444c792fa3a9bb2e4173904b392a4c8a

          SHA256

          f74aff5fde604ba9819451ee5011f398a486856d79bb978ab24ce9b62e452ae9

          SHA512

          a67fd383d7f41a030ad5049442efa7a24b422f7353decffe007b08bbaf685e8934ab882dbabc1e1c73ca90330f215d469d25ae490b087fc9f8c63c7c21567ac1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5431225.exe

          Filesize

          911KB

          MD5

          dd20108b6a8f301a63f95be0880f1cf6

          SHA1

          3328e2b7095c03017a4e2f6a929fa0a16ab8c2d7

          SHA256

          026e6dda92e77ecc2193285f96035b87cefad942a36a1868788556efe9c829ad

          SHA512

          67d7b12c8521aa0fcbbde790857eef03f77262ecc72d851fac623d0b3a2442054361b9f628a458a4ad94903849794c18a587cdc1928d963367b12cf271d63497

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5431225.exe

          Filesize

          911KB

          MD5

          dd20108b6a8f301a63f95be0880f1cf6

          SHA1

          3328e2b7095c03017a4e2f6a929fa0a16ab8c2d7

          SHA256

          026e6dda92e77ecc2193285f96035b87cefad942a36a1868788556efe9c829ad

          SHA512

          67d7b12c8521aa0fcbbde790857eef03f77262ecc72d851fac623d0b3a2442054361b9f628a458a4ad94903849794c18a587cdc1928d963367b12cf271d63497

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0356045.exe

          Filesize

          707KB

          MD5

          33155b7f88b957fff7e94c0d3c144284

          SHA1

          2a164673a8986a6b1660ebd96dfdf8900cc5355e

          SHA256

          ed6c554383497fc07f6f4df17ab27183a1a9b7bfb645e1d1ac6e2a0fd9097949

          SHA512

          d38d0b439998f5062d96998c14646a34c4552d0a3cd34692ccf02c5a9b0e448a8ee3c421bc7e2de954131fcfb3ace9466108fda5898b29106aa102e1cd674588

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0356045.exe

          Filesize

          707KB

          MD5

          33155b7f88b957fff7e94c0d3c144284

          SHA1

          2a164673a8986a6b1660ebd96dfdf8900cc5355e

          SHA256

          ed6c554383497fc07f6f4df17ab27183a1a9b7bfb645e1d1ac6e2a0fd9097949

          SHA512

          d38d0b439998f5062d96998c14646a34c4552d0a3cd34692ccf02c5a9b0e448a8ee3c421bc7e2de954131fcfb3ace9466108fda5898b29106aa102e1cd674588

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9874906.exe

          Filesize

          416KB

          MD5

          87726fd22d33d9b9f6c3322118e803a9

          SHA1

          b3a073d854d0a2032ac6801c4136ea665a7d312f

          SHA256

          0bfcaed93a9c2723bf540663be6c370b81d7e68e3cfeaa56025d347336c6cebb

          SHA512

          077fc39db21a5fdaeb7f8a43d5d7bcf17f032e7f6a40a43ee8353f76abd5bc00f84e42e11e5d52e87a4b52d3d7a86bc7cf9dd34bffd7a96c48162c58289b9069

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9874906.exe

          Filesize

          416KB

          MD5

          87726fd22d33d9b9f6c3322118e803a9

          SHA1

          b3a073d854d0a2032ac6801c4136ea665a7d312f

          SHA256

          0bfcaed93a9c2723bf540663be6c370b81d7e68e3cfeaa56025d347336c6cebb

          SHA512

          077fc39db21a5fdaeb7f8a43d5d7bcf17f032e7f6a40a43ee8353f76abd5bc00f84e42e11e5d52e87a4b52d3d7a86bc7cf9dd34bffd7a96c48162c58289b9069

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2627349.exe

          Filesize

          360KB

          MD5

          eefec6965cf844b573e1b6e63d35a38c

          SHA1

          5260ec483805353c456ab0508bfa12c44546a7d2

          SHA256

          7d37f61294bc5389e12cad9bab0c7b1d5311d6451260a92582029a3c69db8a83

          SHA512

          7e0833b2d2de2d09cf59d4444b8267bd1025f8c73655d7d6aeee4dc7773296b8ed223226d4548fab27feeb3c4b3703e5864fe6a270a29606e0d1b1328ce54743

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2627349.exe

          Filesize

          360KB

          MD5

          eefec6965cf844b573e1b6e63d35a38c

          SHA1

          5260ec483805353c456ab0508bfa12c44546a7d2

          SHA256

          7d37f61294bc5389e12cad9bab0c7b1d5311d6451260a92582029a3c69db8a83

          SHA512

          7e0833b2d2de2d09cf59d4444b8267bd1025f8c73655d7d6aeee4dc7773296b8ed223226d4548fab27feeb3c4b3703e5864fe6a270a29606e0d1b1328ce54743

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2627349.exe

          Filesize

          360KB

          MD5

          eefec6965cf844b573e1b6e63d35a38c

          SHA1

          5260ec483805353c456ab0508bfa12c44546a7d2

          SHA256

          7d37f61294bc5389e12cad9bab0c7b1d5311d6451260a92582029a3c69db8a83

          SHA512

          7e0833b2d2de2d09cf59d4444b8267bd1025f8c73655d7d6aeee4dc7773296b8ed223226d4548fab27feeb3c4b3703e5864fe6a270a29606e0d1b1328ce54743

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8839101.exe

          Filesize

          136KB

          MD5

          4d8d725d8767b51e6d121649ea681480

          SHA1

          a57f694dc479c4c17e440e27c90d1e611029d081

          SHA256

          408eebe9e460793a3da6d643f188cd8b5e84567ddfe4848ec9f5b78d452c290a

          SHA512

          7efcc993aa41469972e0df495ef279b6a0fd7cbe89ed88b6de7662cc831554cbc608d6becaa70165ff4c8b7ad7af37cc1679ebbbeaa928dda53faa12cd724656

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8839101.exe

          Filesize

          136KB

          MD5

          4d8d725d8767b51e6d121649ea681480

          SHA1

          a57f694dc479c4c17e440e27c90d1e611029d081

          SHA256

          408eebe9e460793a3da6d643f188cd8b5e84567ddfe4848ec9f5b78d452c290a

          SHA512

          7efcc993aa41469972e0df495ef279b6a0fd7cbe89ed88b6de7662cc831554cbc608d6becaa70165ff4c8b7ad7af37cc1679ebbbeaa928dda53faa12cd724656

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v2589677.exe

          Filesize

          1.4MB

          MD5

          746e9f69407a5a0aa40df43add996aee

          SHA1

          48730c0b444c792fa3a9bb2e4173904b392a4c8a

          SHA256

          f74aff5fde604ba9819451ee5011f398a486856d79bb978ab24ce9b62e452ae9

          SHA512

          a67fd383d7f41a030ad5049442efa7a24b422f7353decffe007b08bbaf685e8934ab882dbabc1e1c73ca90330f215d469d25ae490b087fc9f8c63c7c21567ac1

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v2589677.exe

          Filesize

          1.4MB

          MD5

          746e9f69407a5a0aa40df43add996aee

          SHA1

          48730c0b444c792fa3a9bb2e4173904b392a4c8a

          SHA256

          f74aff5fde604ba9819451ee5011f398a486856d79bb978ab24ce9b62e452ae9

          SHA512

          a67fd383d7f41a030ad5049442efa7a24b422f7353decffe007b08bbaf685e8934ab882dbabc1e1c73ca90330f215d469d25ae490b087fc9f8c63c7c21567ac1

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5431225.exe

          Filesize

          911KB

          MD5

          dd20108b6a8f301a63f95be0880f1cf6

          SHA1

          3328e2b7095c03017a4e2f6a929fa0a16ab8c2d7

          SHA256

          026e6dda92e77ecc2193285f96035b87cefad942a36a1868788556efe9c829ad

          SHA512

          67d7b12c8521aa0fcbbde790857eef03f77262ecc72d851fac623d0b3a2442054361b9f628a458a4ad94903849794c18a587cdc1928d963367b12cf271d63497

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5431225.exe

          Filesize

          911KB

          MD5

          dd20108b6a8f301a63f95be0880f1cf6

          SHA1

          3328e2b7095c03017a4e2f6a929fa0a16ab8c2d7

          SHA256

          026e6dda92e77ecc2193285f96035b87cefad942a36a1868788556efe9c829ad

          SHA512

          67d7b12c8521aa0fcbbde790857eef03f77262ecc72d851fac623d0b3a2442054361b9f628a458a4ad94903849794c18a587cdc1928d963367b12cf271d63497

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0356045.exe

          Filesize

          707KB

          MD5

          33155b7f88b957fff7e94c0d3c144284

          SHA1

          2a164673a8986a6b1660ebd96dfdf8900cc5355e

          SHA256

          ed6c554383497fc07f6f4df17ab27183a1a9b7bfb645e1d1ac6e2a0fd9097949

          SHA512

          d38d0b439998f5062d96998c14646a34c4552d0a3cd34692ccf02c5a9b0e448a8ee3c421bc7e2de954131fcfb3ace9466108fda5898b29106aa102e1cd674588

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0356045.exe

          Filesize

          707KB

          MD5

          33155b7f88b957fff7e94c0d3c144284

          SHA1

          2a164673a8986a6b1660ebd96dfdf8900cc5355e

          SHA256

          ed6c554383497fc07f6f4df17ab27183a1a9b7bfb645e1d1ac6e2a0fd9097949

          SHA512

          d38d0b439998f5062d96998c14646a34c4552d0a3cd34692ccf02c5a9b0e448a8ee3c421bc7e2de954131fcfb3ace9466108fda5898b29106aa102e1cd674588

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v9874906.exe

          Filesize

          416KB

          MD5

          87726fd22d33d9b9f6c3322118e803a9

          SHA1

          b3a073d854d0a2032ac6801c4136ea665a7d312f

          SHA256

          0bfcaed93a9c2723bf540663be6c370b81d7e68e3cfeaa56025d347336c6cebb

          SHA512

          077fc39db21a5fdaeb7f8a43d5d7bcf17f032e7f6a40a43ee8353f76abd5bc00f84e42e11e5d52e87a4b52d3d7a86bc7cf9dd34bffd7a96c48162c58289b9069

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v9874906.exe

          Filesize

          416KB

          MD5

          87726fd22d33d9b9f6c3322118e803a9

          SHA1

          b3a073d854d0a2032ac6801c4136ea665a7d312f

          SHA256

          0bfcaed93a9c2723bf540663be6c370b81d7e68e3cfeaa56025d347336c6cebb

          SHA512

          077fc39db21a5fdaeb7f8a43d5d7bcf17f032e7f6a40a43ee8353f76abd5bc00f84e42e11e5d52e87a4b52d3d7a86bc7cf9dd34bffd7a96c48162c58289b9069

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a2627349.exe

          Filesize

          360KB

          MD5

          eefec6965cf844b573e1b6e63d35a38c

          SHA1

          5260ec483805353c456ab0508bfa12c44546a7d2

          SHA256

          7d37f61294bc5389e12cad9bab0c7b1d5311d6451260a92582029a3c69db8a83

          SHA512

          7e0833b2d2de2d09cf59d4444b8267bd1025f8c73655d7d6aeee4dc7773296b8ed223226d4548fab27feeb3c4b3703e5864fe6a270a29606e0d1b1328ce54743

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a2627349.exe

          Filesize

          360KB

          MD5

          eefec6965cf844b573e1b6e63d35a38c

          SHA1

          5260ec483805353c456ab0508bfa12c44546a7d2

          SHA256

          7d37f61294bc5389e12cad9bab0c7b1d5311d6451260a92582029a3c69db8a83

          SHA512

          7e0833b2d2de2d09cf59d4444b8267bd1025f8c73655d7d6aeee4dc7773296b8ed223226d4548fab27feeb3c4b3703e5864fe6a270a29606e0d1b1328ce54743

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a2627349.exe

          Filesize

          360KB

          MD5

          eefec6965cf844b573e1b6e63d35a38c

          SHA1

          5260ec483805353c456ab0508bfa12c44546a7d2

          SHA256

          7d37f61294bc5389e12cad9bab0c7b1d5311d6451260a92582029a3c69db8a83

          SHA512

          7e0833b2d2de2d09cf59d4444b8267bd1025f8c73655d7d6aeee4dc7773296b8ed223226d4548fab27feeb3c4b3703e5864fe6a270a29606e0d1b1328ce54743

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8839101.exe

          Filesize

          136KB

          MD5

          4d8d725d8767b51e6d121649ea681480

          SHA1

          a57f694dc479c4c17e440e27c90d1e611029d081

          SHA256

          408eebe9e460793a3da6d643f188cd8b5e84567ddfe4848ec9f5b78d452c290a

          SHA512

          7efcc993aa41469972e0df495ef279b6a0fd7cbe89ed88b6de7662cc831554cbc608d6becaa70165ff4c8b7ad7af37cc1679ebbbeaa928dda53faa12cd724656

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8839101.exe

          Filesize

          136KB

          MD5

          4d8d725d8767b51e6d121649ea681480

          SHA1

          a57f694dc479c4c17e440e27c90d1e611029d081

          SHA256

          408eebe9e460793a3da6d643f188cd8b5e84567ddfe4848ec9f5b78d452c290a

          SHA512

          7efcc993aa41469972e0df495ef279b6a0fd7cbe89ed88b6de7662cc831554cbc608d6becaa70165ff4c8b7ad7af37cc1679ebbbeaa928dda53faa12cd724656

        • memory/784-112-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-114-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-116-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-118-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-120-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-122-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-124-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-126-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-128-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-130-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-132-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-134-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-136-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-138-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-139-0x0000000004E20000-0x0000000004E60000-memory.dmp

          Filesize

          256KB

        • memory/784-140-0x0000000004E20000-0x0000000004E60000-memory.dmp

          Filesize

          256KB

        • memory/784-141-0x0000000000400000-0x00000000006F4000-memory.dmp

          Filesize

          3.0MB

        • memory/784-142-0x00000000002D0000-0x00000000002FD000-memory.dmp

          Filesize

          180KB

        • memory/784-145-0x0000000000400000-0x00000000006F4000-memory.dmp

          Filesize

          3.0MB

        • memory/784-111-0x00000000009B0000-0x00000000009C2000-memory.dmp

          Filesize

          72KB

        • memory/784-110-0x00000000009B0000-0x00000000009C8000-memory.dmp

          Filesize

          96KB

        • memory/784-109-0x0000000000970000-0x000000000098A000-memory.dmp

          Filesize

          104KB

        • memory/784-108-0x00000000002D0000-0x00000000002FD000-memory.dmp

          Filesize

          180KB

        • memory/984-152-0x0000000001040000-0x0000000001068000-memory.dmp

          Filesize

          160KB

        • memory/984-153-0x0000000007080000-0x00000000070C0000-memory.dmp

          Filesize

          256KB

        • memory/984-154-0x0000000007080000-0x00000000070C0000-memory.dmp

          Filesize

          256KB