Analysis

  • max time kernel
    141s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:20

General

  • Target

    366cf436719913b2d45c8377489b961bbc0f69fdd4b4f33ee8af8e96b453c07a.exe

  • Size

    694KB

  • MD5

    6aa3a32b68c8303be4323b82e20401a7

  • SHA1

    ba3302659143960b8af36d6724922b0485deddbc

  • SHA256

    366cf436719913b2d45c8377489b961bbc0f69fdd4b4f33ee8af8e96b453c07a

  • SHA512

    ddf5a252cab9c917f49c5e84d5cc54e29a7cd45799266e2c49a91aa346256fe3d7ca05a7502933fd6df4187d39977f9b96d9b5b684f81d79f52017452202207a

  • SSDEEP

    12288:Ty90+4jgZKiwFETN4aZ2i4309WJ1cN46pb66KrzR6IfTZUVNp7X/KbrmIsl:TyojqKiBJ4U4E8uKzRrANp7XSbCXl

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\366cf436719913b2d45c8377489b961bbc0f69fdd4b4f33ee8af8e96b453c07a.exe
    "C:\Users\Admin\AppData\Local\Temp\366cf436719913b2d45c8377489b961bbc0f69fdd4b4f33ee8af8e96b453c07a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un985157.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un985157.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09957394.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09957394.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:472
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk732280.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk732280.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1096

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un985157.exe

          Filesize

          540KB

          MD5

          4178d7fb6729af91de0579c83b78e1b0

          SHA1

          cd96c1b01c0a296078b8bb1d7a6350c5d900f488

          SHA256

          a9e1af4c6ebafe6e26186b3217c49b2a011ea94b5179f338a0067f9ff931a1ea

          SHA512

          e7a1e210f43e7f54f0cd850f7b66a8e47dd0205d65599130fbbbb531abd8a8275fd23b15bcc862611eef7ce87995f1d70828aa08ded4350b5a73bbca3a7483d9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un985157.exe

          Filesize

          540KB

          MD5

          4178d7fb6729af91de0579c83b78e1b0

          SHA1

          cd96c1b01c0a296078b8bb1d7a6350c5d900f488

          SHA256

          a9e1af4c6ebafe6e26186b3217c49b2a011ea94b5179f338a0067f9ff931a1ea

          SHA512

          e7a1e210f43e7f54f0cd850f7b66a8e47dd0205d65599130fbbbb531abd8a8275fd23b15bcc862611eef7ce87995f1d70828aa08ded4350b5a73bbca3a7483d9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09957394.exe

          Filesize

          258KB

          MD5

          0cd4626123390ec7c4e1df81f2ae99ef

          SHA1

          baf5324343b86650cbc8e5fa8d2a4a01810247cf

          SHA256

          580c9a0fa266f9526811a65003cdfbd496d02ef09b560c9b51e925fc70a947a9

          SHA512

          a2a1d9825d0be9507df166bd81733c06dccdea535ebf79021dac4b90940ae31efd0fb12a78ec7494e18788c9d3bb8f42367cef01ca20db3b98f87902d1fcb8c6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09957394.exe

          Filesize

          258KB

          MD5

          0cd4626123390ec7c4e1df81f2ae99ef

          SHA1

          baf5324343b86650cbc8e5fa8d2a4a01810247cf

          SHA256

          580c9a0fa266f9526811a65003cdfbd496d02ef09b560c9b51e925fc70a947a9

          SHA512

          a2a1d9825d0be9507df166bd81733c06dccdea535ebf79021dac4b90940ae31efd0fb12a78ec7494e18788c9d3bb8f42367cef01ca20db3b98f87902d1fcb8c6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09957394.exe

          Filesize

          258KB

          MD5

          0cd4626123390ec7c4e1df81f2ae99ef

          SHA1

          baf5324343b86650cbc8e5fa8d2a4a01810247cf

          SHA256

          580c9a0fa266f9526811a65003cdfbd496d02ef09b560c9b51e925fc70a947a9

          SHA512

          a2a1d9825d0be9507df166bd81733c06dccdea535ebf79021dac4b90940ae31efd0fb12a78ec7494e18788c9d3bb8f42367cef01ca20db3b98f87902d1fcb8c6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk732280.exe

          Filesize

          341KB

          MD5

          0afb0a5c773615af564b7cabd8c83d8f

          SHA1

          bdbb49f580f55cafbe0d22912e814bc99956d5f4

          SHA256

          b0aa4ca5590f81435ef08631e4399c4e177ebb384278a6d99fab55e0e57a31ba

          SHA512

          f0e25203493a896eb122de1adc12a0d6c10746515c3ae31b0da14a687139229e815a8a5a4aaccd68887e206cd53f94d696cd2153e43f8910ade9dec0d3bb520e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk732280.exe

          Filesize

          341KB

          MD5

          0afb0a5c773615af564b7cabd8c83d8f

          SHA1

          bdbb49f580f55cafbe0d22912e814bc99956d5f4

          SHA256

          b0aa4ca5590f81435ef08631e4399c4e177ebb384278a6d99fab55e0e57a31ba

          SHA512

          f0e25203493a896eb122de1adc12a0d6c10746515c3ae31b0da14a687139229e815a8a5a4aaccd68887e206cd53f94d696cd2153e43f8910ade9dec0d3bb520e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk732280.exe

          Filesize

          341KB

          MD5

          0afb0a5c773615af564b7cabd8c83d8f

          SHA1

          bdbb49f580f55cafbe0d22912e814bc99956d5f4

          SHA256

          b0aa4ca5590f81435ef08631e4399c4e177ebb384278a6d99fab55e0e57a31ba

          SHA512

          f0e25203493a896eb122de1adc12a0d6c10746515c3ae31b0da14a687139229e815a8a5a4aaccd68887e206cd53f94d696cd2153e43f8910ade9dec0d3bb520e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un985157.exe

          Filesize

          540KB

          MD5

          4178d7fb6729af91de0579c83b78e1b0

          SHA1

          cd96c1b01c0a296078b8bb1d7a6350c5d900f488

          SHA256

          a9e1af4c6ebafe6e26186b3217c49b2a011ea94b5179f338a0067f9ff931a1ea

          SHA512

          e7a1e210f43e7f54f0cd850f7b66a8e47dd0205d65599130fbbbb531abd8a8275fd23b15bcc862611eef7ce87995f1d70828aa08ded4350b5a73bbca3a7483d9

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un985157.exe

          Filesize

          540KB

          MD5

          4178d7fb6729af91de0579c83b78e1b0

          SHA1

          cd96c1b01c0a296078b8bb1d7a6350c5d900f488

          SHA256

          a9e1af4c6ebafe6e26186b3217c49b2a011ea94b5179f338a0067f9ff931a1ea

          SHA512

          e7a1e210f43e7f54f0cd850f7b66a8e47dd0205d65599130fbbbb531abd8a8275fd23b15bcc862611eef7ce87995f1d70828aa08ded4350b5a73bbca3a7483d9

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\09957394.exe

          Filesize

          258KB

          MD5

          0cd4626123390ec7c4e1df81f2ae99ef

          SHA1

          baf5324343b86650cbc8e5fa8d2a4a01810247cf

          SHA256

          580c9a0fa266f9526811a65003cdfbd496d02ef09b560c9b51e925fc70a947a9

          SHA512

          a2a1d9825d0be9507df166bd81733c06dccdea535ebf79021dac4b90940ae31efd0fb12a78ec7494e18788c9d3bb8f42367cef01ca20db3b98f87902d1fcb8c6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\09957394.exe

          Filesize

          258KB

          MD5

          0cd4626123390ec7c4e1df81f2ae99ef

          SHA1

          baf5324343b86650cbc8e5fa8d2a4a01810247cf

          SHA256

          580c9a0fa266f9526811a65003cdfbd496d02ef09b560c9b51e925fc70a947a9

          SHA512

          a2a1d9825d0be9507df166bd81733c06dccdea535ebf79021dac4b90940ae31efd0fb12a78ec7494e18788c9d3bb8f42367cef01ca20db3b98f87902d1fcb8c6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\09957394.exe

          Filesize

          258KB

          MD5

          0cd4626123390ec7c4e1df81f2ae99ef

          SHA1

          baf5324343b86650cbc8e5fa8d2a4a01810247cf

          SHA256

          580c9a0fa266f9526811a65003cdfbd496d02ef09b560c9b51e925fc70a947a9

          SHA512

          a2a1d9825d0be9507df166bd81733c06dccdea535ebf79021dac4b90940ae31efd0fb12a78ec7494e18788c9d3bb8f42367cef01ca20db3b98f87902d1fcb8c6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk732280.exe

          Filesize

          341KB

          MD5

          0afb0a5c773615af564b7cabd8c83d8f

          SHA1

          bdbb49f580f55cafbe0d22912e814bc99956d5f4

          SHA256

          b0aa4ca5590f81435ef08631e4399c4e177ebb384278a6d99fab55e0e57a31ba

          SHA512

          f0e25203493a896eb122de1adc12a0d6c10746515c3ae31b0da14a687139229e815a8a5a4aaccd68887e206cd53f94d696cd2153e43f8910ade9dec0d3bb520e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk732280.exe

          Filesize

          341KB

          MD5

          0afb0a5c773615af564b7cabd8c83d8f

          SHA1

          bdbb49f580f55cafbe0d22912e814bc99956d5f4

          SHA256

          b0aa4ca5590f81435ef08631e4399c4e177ebb384278a6d99fab55e0e57a31ba

          SHA512

          f0e25203493a896eb122de1adc12a0d6c10746515c3ae31b0da14a687139229e815a8a5a4aaccd68887e206cd53f94d696cd2153e43f8910ade9dec0d3bb520e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk732280.exe

          Filesize

          341KB

          MD5

          0afb0a5c773615af564b7cabd8c83d8f

          SHA1

          bdbb49f580f55cafbe0d22912e814bc99956d5f4

          SHA256

          b0aa4ca5590f81435ef08631e4399c4e177ebb384278a6d99fab55e0e57a31ba

          SHA512

          f0e25203493a896eb122de1adc12a0d6c10746515c3ae31b0da14a687139229e815a8a5a4aaccd68887e206cd53f94d696cd2153e43f8910ade9dec0d3bb520e

        • memory/472-108-0x0000000000240000-0x000000000026D000-memory.dmp

          Filesize

          180KB

        • memory/472-87-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-89-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-91-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-93-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-95-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-97-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-99-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-107-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-105-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-103-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-101-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-109-0x0000000007200000-0x0000000007240000-memory.dmp

          Filesize

          256KB

        • memory/472-110-0x0000000007200000-0x0000000007240000-memory.dmp

          Filesize

          256KB

        • memory/472-85-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-111-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/472-83-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-81-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-80-0x0000000002D00000-0x0000000002D13000-memory.dmp

          Filesize

          76KB

        • memory/472-79-0x0000000002D00000-0x0000000002D18000-memory.dmp

          Filesize

          96KB

        • memory/472-78-0x00000000003D0000-0x00000000003EA000-memory.dmp

          Filesize

          104KB

        • memory/472-112-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/1096-124-0x0000000004A80000-0x0000000004ABA000-memory.dmp

          Filesize

          232KB

        • memory/1096-143-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-125-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-126-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-128-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-130-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-132-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-134-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-136-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-138-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-140-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-123-0x0000000004700000-0x000000000473C000-memory.dmp

          Filesize

          240KB

        • memory/1096-145-0x0000000007410000-0x0000000007450000-memory.dmp

          Filesize

          256KB

        • memory/1096-146-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-142-0x00000000002F0000-0x0000000000336000-memory.dmp

          Filesize

          280KB

        • memory/1096-148-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-150-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-152-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-154-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-156-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-158-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-160-0x0000000004A80000-0x0000000004AB5000-memory.dmp

          Filesize

          212KB

        • memory/1096-921-0x0000000007410000-0x0000000007450000-memory.dmp

          Filesize

          256KB

        • memory/1096-923-0x0000000007410000-0x0000000007450000-memory.dmp

          Filesize

          256KB