Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:30

General

  • Target

    0f3da553f65b9622232a989f87c96f2cc80ef50d96509b323b5b6cac4f50d3e9.exe

  • Size

    651KB

  • MD5

    bac11aa049b2b38f4f932489291533c8

  • SHA1

    b1b66bf0fc1df0da2c32459ebfcec4d841ec5466

  • SHA256

    0f3da553f65b9622232a989f87c96f2cc80ef50d96509b323b5b6cac4f50d3e9

  • SHA512

    a4711b8960b236c1fb5ed642e88fd14ce5ab79b8c08f961ba3821ff9fb0fdb85a7915d21fc1ac087d97803581c115275e9f8ca3267d3f783a09f3ded9c300996

  • SSDEEP

    12288:vy90MEIA9bN836tJ0PzC7tbOD4eMNRJorQHlh0l1I2PmQenTZihs:vyOn8qtJ0PzC7tbvur4cG2P5enTZv

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f3da553f65b9622232a989f87c96f2cc80ef50d96509b323b5b6cac4f50d3e9.exe
    "C:\Users\Admin\AppData\Local\Temp\0f3da553f65b9622232a989f87c96f2cc80ef50d96509b323b5b6cac4f50d3e9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st908669.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st908669.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09791005.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09791005.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp392907.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp392907.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st908669.exe

    Filesize

    497KB

    MD5

    469d48a61d84c00c7dfe5a4f71720aa4

    SHA1

    ba3557aac418da6f81f4a0b8e49899bf2e64308e

    SHA256

    20d891ab575c3db6fea7173472a1256761112ec4e5ab5a0928501b9615d08b7b

    SHA512

    71bfb5f124ba1104e0253b36d339945c252f79e545cf42a7315d7e818381beba1157072a270fe4328e2decc29232dcc90181deac4b6f33b35517cac1169d51a9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st908669.exe

    Filesize

    497KB

    MD5

    469d48a61d84c00c7dfe5a4f71720aa4

    SHA1

    ba3557aac418da6f81f4a0b8e49899bf2e64308e

    SHA256

    20d891ab575c3db6fea7173472a1256761112ec4e5ab5a0928501b9615d08b7b

    SHA512

    71bfb5f124ba1104e0253b36d339945c252f79e545cf42a7315d7e818381beba1157072a270fe4328e2decc29232dcc90181deac4b6f33b35517cac1169d51a9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09791005.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09791005.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp392907.exe

    Filesize

    341KB

    MD5

    5351fcea813064cccb70cf8ab2307730

    SHA1

    e0bf031952afa490c9f687e322c71d3f45e3ac10

    SHA256

    f74a7fd7804ad9c7d4f4f2e60344349749f5f4d640699327bc9aacddee066ac9

    SHA512

    79723ba535ce28d10d70111b30470ae3147376b53d893b0d4675492cbda224b48830eade7fed0582a82e47ec23c501cd16cf910024c7b7662004cb3b9cbd3db0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp392907.exe

    Filesize

    341KB

    MD5

    5351fcea813064cccb70cf8ab2307730

    SHA1

    e0bf031952afa490c9f687e322c71d3f45e3ac10

    SHA256

    f74a7fd7804ad9c7d4f4f2e60344349749f5f4d640699327bc9aacddee066ac9

    SHA512

    79723ba535ce28d10d70111b30470ae3147376b53d893b0d4675492cbda224b48830eade7fed0582a82e47ec23c501cd16cf910024c7b7662004cb3b9cbd3db0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp392907.exe

    Filesize

    341KB

    MD5

    5351fcea813064cccb70cf8ab2307730

    SHA1

    e0bf031952afa490c9f687e322c71d3f45e3ac10

    SHA256

    f74a7fd7804ad9c7d4f4f2e60344349749f5f4d640699327bc9aacddee066ac9

    SHA512

    79723ba535ce28d10d70111b30470ae3147376b53d893b0d4675492cbda224b48830eade7fed0582a82e47ec23c501cd16cf910024c7b7662004cb3b9cbd3db0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st908669.exe

    Filesize

    497KB

    MD5

    469d48a61d84c00c7dfe5a4f71720aa4

    SHA1

    ba3557aac418da6f81f4a0b8e49899bf2e64308e

    SHA256

    20d891ab575c3db6fea7173472a1256761112ec4e5ab5a0928501b9615d08b7b

    SHA512

    71bfb5f124ba1104e0253b36d339945c252f79e545cf42a7315d7e818381beba1157072a270fe4328e2decc29232dcc90181deac4b6f33b35517cac1169d51a9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st908669.exe

    Filesize

    497KB

    MD5

    469d48a61d84c00c7dfe5a4f71720aa4

    SHA1

    ba3557aac418da6f81f4a0b8e49899bf2e64308e

    SHA256

    20d891ab575c3db6fea7173472a1256761112ec4e5ab5a0928501b9615d08b7b

    SHA512

    71bfb5f124ba1104e0253b36d339945c252f79e545cf42a7315d7e818381beba1157072a270fe4328e2decc29232dcc90181deac4b6f33b35517cac1169d51a9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\09791005.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\09791005.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp392907.exe

    Filesize

    341KB

    MD5

    5351fcea813064cccb70cf8ab2307730

    SHA1

    e0bf031952afa490c9f687e322c71d3f45e3ac10

    SHA256

    f74a7fd7804ad9c7d4f4f2e60344349749f5f4d640699327bc9aacddee066ac9

    SHA512

    79723ba535ce28d10d70111b30470ae3147376b53d893b0d4675492cbda224b48830eade7fed0582a82e47ec23c501cd16cf910024c7b7662004cb3b9cbd3db0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp392907.exe

    Filesize

    341KB

    MD5

    5351fcea813064cccb70cf8ab2307730

    SHA1

    e0bf031952afa490c9f687e322c71d3f45e3ac10

    SHA256

    f74a7fd7804ad9c7d4f4f2e60344349749f5f4d640699327bc9aacddee066ac9

    SHA512

    79723ba535ce28d10d70111b30470ae3147376b53d893b0d4675492cbda224b48830eade7fed0582a82e47ec23c501cd16cf910024c7b7662004cb3b9cbd3db0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp392907.exe

    Filesize

    341KB

    MD5

    5351fcea813064cccb70cf8ab2307730

    SHA1

    e0bf031952afa490c9f687e322c71d3f45e3ac10

    SHA256

    f74a7fd7804ad9c7d4f4f2e60344349749f5f4d640699327bc9aacddee066ac9

    SHA512

    79723ba535ce28d10d70111b30470ae3147376b53d893b0d4675492cbda224b48830eade7fed0582a82e47ec23c501cd16cf910024c7b7662004cb3b9cbd3db0

  • memory/1444-82-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-80-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-84-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-88-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-86-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-92-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-90-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-96-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-94-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-100-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-98-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-104-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-102-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-106-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-79-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1444-78-0x0000000000580000-0x0000000000598000-memory.dmp

    Filesize

    96KB

  • memory/1444-77-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1444-76-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1444-74-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1444-75-0x00000000004E0000-0x00000000004FA000-memory.dmp

    Filesize

    104KB

  • memory/1620-120-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-137-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-119-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-117-0x00000000004F0000-0x000000000052C000-memory.dmp

    Filesize

    240KB

  • memory/1620-122-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-124-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/1620-126-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-127-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/1620-125-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/1620-129-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-131-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-133-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-135-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-118-0x00000000005A0000-0x00000000005DA000-memory.dmp

    Filesize

    232KB

  • memory/1620-139-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-141-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-143-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-145-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-147-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-149-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-153-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-151-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-155-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-157-0x00000000005A0000-0x00000000005D5000-memory.dmp

    Filesize

    212KB

  • memory/1620-915-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/1620-916-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/1620-917-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/1620-920-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB