Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:26

General

  • Target

    3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe

  • Size

    694KB

  • MD5

    c573fbc09828359cd16daee9a7b4ed96

  • SHA1

    29d949ce761176d1a2cbd98da256bc863110b28d

  • SHA256

    3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9

  • SHA512

    a3503198270f42bc6fa343f3e9ebad2fc61b97efd30126ef0c65804fd86f190f9330015b465f9f2b2d978bfd0b7e7a392f5761617b347a04d4739c22e5b2525b

  • SSDEEP

    12288:Fy90sfJ12HiqalR3PbTZyB+Ibd1srBeAjWK1gmOQ4ZRhuyHO0iDqe7t0eNhNws2:FyLh12CHlR3Pm+IZ1sF7+mOTj1n1e7t2

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe
    "C:\Users\Admin\AppData\Local\Temp\3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598197.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598197.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38003302.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38003302.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301490.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301490.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598197.exe

    Filesize

    540KB

    MD5

    acd099afc15fbb2b7a6847a0e764fbf4

    SHA1

    8fb51d14a122881e52d87decede6a132955d6698

    SHA256

    be97a486f19a5617e4a2150e86813d8806c8e24c4111f38f01a83a6637bdb45e

    SHA512

    77310aaacdab04465712fd1c4840a01bf52a24a99e432dd46bd494207e73a9f026dd47da8c3d35314dfe061ba5e1b1540a98a4fd87775f21211ac5df96ac8e4e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598197.exe

    Filesize

    540KB

    MD5

    acd099afc15fbb2b7a6847a0e764fbf4

    SHA1

    8fb51d14a122881e52d87decede6a132955d6698

    SHA256

    be97a486f19a5617e4a2150e86813d8806c8e24c4111f38f01a83a6637bdb45e

    SHA512

    77310aaacdab04465712fd1c4840a01bf52a24a99e432dd46bd494207e73a9f026dd47da8c3d35314dfe061ba5e1b1540a98a4fd87775f21211ac5df96ac8e4e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38003302.exe

    Filesize

    264KB

    MD5

    eaa0c6aa9904cdf629bbe8b04114aced

    SHA1

    932b165a8ee0386669d02d975583e804e5d4ce07

    SHA256

    0da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411

    SHA512

    8e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38003302.exe

    Filesize

    264KB

    MD5

    eaa0c6aa9904cdf629bbe8b04114aced

    SHA1

    932b165a8ee0386669d02d975583e804e5d4ce07

    SHA256

    0da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411

    SHA512

    8e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38003302.exe

    Filesize

    264KB

    MD5

    eaa0c6aa9904cdf629bbe8b04114aced

    SHA1

    932b165a8ee0386669d02d975583e804e5d4ce07

    SHA256

    0da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411

    SHA512

    8e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301490.exe

    Filesize

    348KB

    MD5

    08333d96633502ade11a06ce814b8aa3

    SHA1

    3c8b110b39638900b52153726e31a4a58cdd516d

    SHA256

    47e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518

    SHA512

    1cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301490.exe

    Filesize

    348KB

    MD5

    08333d96633502ade11a06ce814b8aa3

    SHA1

    3c8b110b39638900b52153726e31a4a58cdd516d

    SHA256

    47e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518

    SHA512

    1cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301490.exe

    Filesize

    348KB

    MD5

    08333d96633502ade11a06ce814b8aa3

    SHA1

    3c8b110b39638900b52153726e31a4a58cdd516d

    SHA256

    47e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518

    SHA512

    1cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un598197.exe

    Filesize

    540KB

    MD5

    acd099afc15fbb2b7a6847a0e764fbf4

    SHA1

    8fb51d14a122881e52d87decede6a132955d6698

    SHA256

    be97a486f19a5617e4a2150e86813d8806c8e24c4111f38f01a83a6637bdb45e

    SHA512

    77310aaacdab04465712fd1c4840a01bf52a24a99e432dd46bd494207e73a9f026dd47da8c3d35314dfe061ba5e1b1540a98a4fd87775f21211ac5df96ac8e4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un598197.exe

    Filesize

    540KB

    MD5

    acd099afc15fbb2b7a6847a0e764fbf4

    SHA1

    8fb51d14a122881e52d87decede6a132955d6698

    SHA256

    be97a486f19a5617e4a2150e86813d8806c8e24c4111f38f01a83a6637bdb45e

    SHA512

    77310aaacdab04465712fd1c4840a01bf52a24a99e432dd46bd494207e73a9f026dd47da8c3d35314dfe061ba5e1b1540a98a4fd87775f21211ac5df96ac8e4e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\38003302.exe

    Filesize

    264KB

    MD5

    eaa0c6aa9904cdf629bbe8b04114aced

    SHA1

    932b165a8ee0386669d02d975583e804e5d4ce07

    SHA256

    0da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411

    SHA512

    8e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\38003302.exe

    Filesize

    264KB

    MD5

    eaa0c6aa9904cdf629bbe8b04114aced

    SHA1

    932b165a8ee0386669d02d975583e804e5d4ce07

    SHA256

    0da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411

    SHA512

    8e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\38003302.exe

    Filesize

    264KB

    MD5

    eaa0c6aa9904cdf629bbe8b04114aced

    SHA1

    932b165a8ee0386669d02d975583e804e5d4ce07

    SHA256

    0da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411

    SHA512

    8e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301490.exe

    Filesize

    348KB

    MD5

    08333d96633502ade11a06ce814b8aa3

    SHA1

    3c8b110b39638900b52153726e31a4a58cdd516d

    SHA256

    47e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518

    SHA512

    1cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301490.exe

    Filesize

    348KB

    MD5

    08333d96633502ade11a06ce814b8aa3

    SHA1

    3c8b110b39638900b52153726e31a4a58cdd516d

    SHA256

    47e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518

    SHA512

    1cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301490.exe

    Filesize

    348KB

    MD5

    08333d96633502ade11a06ce814b8aa3

    SHA1

    3c8b110b39638900b52153726e31a4a58cdd516d

    SHA256

    47e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518

    SHA512

    1cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f

  • memory/1444-112-0x0000000000400000-0x0000000002B9D000-memory.dmp

    Filesize

    39.6MB

  • memory/1444-90-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-88-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-94-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-92-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-98-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-104-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-102-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-100-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-96-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-108-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-106-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-109-0x00000000070C0000-0x0000000007100000-memory.dmp

    Filesize

    256KB

  • memory/1444-110-0x00000000070C0000-0x0000000007100000-memory.dmp

    Filesize

    256KB

  • memory/1444-111-0x00000000070C0000-0x0000000007100000-memory.dmp

    Filesize

    256KB

  • memory/1444-86-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-113-0x0000000000400000-0x0000000002B9D000-memory.dmp

    Filesize

    39.6MB

  • memory/1444-84-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-82-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-81-0x0000000004820000-0x0000000004833000-memory.dmp

    Filesize

    76KB

  • memory/1444-80-0x0000000004820000-0x0000000004838000-memory.dmp

    Filesize

    96KB

  • memory/1444-79-0x0000000002CB0000-0x0000000002CCA000-memory.dmp

    Filesize

    104KB

  • memory/1444-78-0x0000000000280000-0x00000000002AD000-memory.dmp

    Filesize

    180KB

  • memory/1960-124-0x0000000002FC0000-0x0000000002FFC000-memory.dmp

    Filesize

    240KB

  • memory/1960-125-0x00000000046B0000-0x00000000046EA000-memory.dmp

    Filesize

    232KB

  • memory/1960-126-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-127-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-129-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-131-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-133-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-135-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-137-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-139-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-141-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-143-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-145-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-147-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-149-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-152-0x0000000000250000-0x0000000000296000-memory.dmp

    Filesize

    280KB

  • memory/1960-151-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-155-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-154-0x0000000007260000-0x00000000072A0000-memory.dmp

    Filesize

    256KB

  • memory/1960-157-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-159-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-161-0x00000000046B0000-0x00000000046E5000-memory.dmp

    Filesize

    212KB

  • memory/1960-920-0x0000000007260000-0x00000000072A0000-memory.dmp

    Filesize

    256KB

  • memory/1960-923-0x0000000007260000-0x00000000072A0000-memory.dmp

    Filesize

    256KB

  • memory/1960-924-0x0000000007260000-0x00000000072A0000-memory.dmp

    Filesize

    256KB