Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:37

General

  • Target

    14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe

  • Size

    701KB

  • MD5

    4bcaf8cdbef79b4dc47c3a4ee21da181

  • SHA1

    d7baa68613ffa89f3e98ab6a1dbfbc091d8a1205

  • SHA256

    14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf

  • SHA512

    3b3910178d40b6cdbf987b755121c1741984ac6dc2392493f4eeabafb0670c4e475fdcdcf3e8de8f65c31afdfd5db998c87e28d9969da36c49ca065af9c61020

  • SSDEEP

    12288:Zy907uUizD6uPZRNT/x8FPclOhgVXb9jMpGiG8GJrGVRmBnBccqoXr:ZyYuFOuxRNTx8lcIhm9jVrGVRmBn2lU

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe
    "C:\Users\Admin\AppData\Local\Temp\14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe

    Filesize

    547KB

    MD5

    1e999155a42215ce3561ee98e7582615

    SHA1

    b443ee2cc1793e498082ba4575a004821fba7e8a

    SHA256

    0324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93

    SHA512

    1a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe

    Filesize

    547KB

    MD5

    1e999155a42215ce3561ee98e7582615

    SHA1

    b443ee2cc1793e498082ba4575a004821fba7e8a

    SHA256

    0324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93

    SHA512

    1a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe

    Filesize

    269KB

    MD5

    b30cc80e434c5d0eb23678030f2e0702

    SHA1

    477560df97c9fc157325dee019702a68c4888590

    SHA256

    9ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304

    SHA512

    8e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe

    Filesize

    269KB

    MD5

    b30cc80e434c5d0eb23678030f2e0702

    SHA1

    477560df97c9fc157325dee019702a68c4888590

    SHA256

    9ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304

    SHA512

    8e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe

    Filesize

    269KB

    MD5

    b30cc80e434c5d0eb23678030f2e0702

    SHA1

    477560df97c9fc157325dee019702a68c4888590

    SHA256

    9ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304

    SHA512

    8e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe

    Filesize

    353KB

    MD5

    b0052a48f062ef5922a4914ac648b8d7

    SHA1

    86f04d8d805c989bc22a0772336d968a1ecb4708

    SHA256

    58469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9

    SHA512

    84b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe

    Filesize

    353KB

    MD5

    b0052a48f062ef5922a4914ac648b8d7

    SHA1

    86f04d8d805c989bc22a0772336d968a1ecb4708

    SHA256

    58469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9

    SHA512

    84b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe

    Filesize

    353KB

    MD5

    b0052a48f062ef5922a4914ac648b8d7

    SHA1

    86f04d8d805c989bc22a0772336d968a1ecb4708

    SHA256

    58469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9

    SHA512

    84b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe

    Filesize

    547KB

    MD5

    1e999155a42215ce3561ee98e7582615

    SHA1

    b443ee2cc1793e498082ba4575a004821fba7e8a

    SHA256

    0324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93

    SHA512

    1a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe

    Filesize

    547KB

    MD5

    1e999155a42215ce3561ee98e7582615

    SHA1

    b443ee2cc1793e498082ba4575a004821fba7e8a

    SHA256

    0324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93

    SHA512

    1a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe

    Filesize

    269KB

    MD5

    b30cc80e434c5d0eb23678030f2e0702

    SHA1

    477560df97c9fc157325dee019702a68c4888590

    SHA256

    9ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304

    SHA512

    8e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe

    Filesize

    269KB

    MD5

    b30cc80e434c5d0eb23678030f2e0702

    SHA1

    477560df97c9fc157325dee019702a68c4888590

    SHA256

    9ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304

    SHA512

    8e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe

    Filesize

    269KB

    MD5

    b30cc80e434c5d0eb23678030f2e0702

    SHA1

    477560df97c9fc157325dee019702a68c4888590

    SHA256

    9ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304

    SHA512

    8e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe

    Filesize

    353KB

    MD5

    b0052a48f062ef5922a4914ac648b8d7

    SHA1

    86f04d8d805c989bc22a0772336d968a1ecb4708

    SHA256

    58469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9

    SHA512

    84b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe

    Filesize

    353KB

    MD5

    b0052a48f062ef5922a4914ac648b8d7

    SHA1

    86f04d8d805c989bc22a0772336d968a1ecb4708

    SHA256

    58469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9

    SHA512

    84b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe

    Filesize

    353KB

    MD5

    b0052a48f062ef5922a4914ac648b8d7

    SHA1

    86f04d8d805c989bc22a0772336d968a1ecb4708

    SHA256

    58469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9

    SHA512

    84b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb

  • memory/580-87-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-91-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-89-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-95-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-93-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-103-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-101-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-99-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-97-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-107-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-105-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-108-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/580-110-0x0000000004B20000-0x0000000004B60000-memory.dmp

    Filesize

    256KB

  • memory/580-109-0x0000000004B20000-0x0000000004B60000-memory.dmp

    Filesize

    256KB

  • memory/580-111-0x0000000000400000-0x0000000002B9E000-memory.dmp

    Filesize

    39.6MB

  • memory/580-112-0x0000000000400000-0x0000000002B9E000-memory.dmp

    Filesize

    39.6MB

  • memory/580-85-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-83-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-81-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-80-0x0000000002CA0000-0x0000000002CB2000-memory.dmp

    Filesize

    72KB

  • memory/580-79-0x0000000002CA0000-0x0000000002CB8000-memory.dmp

    Filesize

    96KB

  • memory/580-78-0x0000000000330000-0x000000000034A000-memory.dmp

    Filesize

    104KB

  • memory/984-128-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-146-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-126-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-123-0x0000000002CB0000-0x0000000002CEC000-memory.dmp

    Filesize

    240KB

  • memory/984-125-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-130-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-132-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-134-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-136-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-138-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-140-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-142-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-148-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-124-0x0000000003360000-0x000000000339A000-memory.dmp

    Filesize

    232KB

  • memory/984-144-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-150-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-152-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-154-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-156-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-158-0x0000000003360000-0x0000000003395000-memory.dmp

    Filesize

    212KB

  • memory/984-422-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/984-424-0x0000000007390000-0x00000000073D0000-memory.dmp

    Filesize

    256KB

  • memory/984-426-0x0000000007390000-0x00000000073D0000-memory.dmp

    Filesize

    256KB

  • memory/984-920-0x0000000007390000-0x00000000073D0000-memory.dmp

    Filesize

    256KB

  • memory/984-922-0x0000000007390000-0x00000000073D0000-memory.dmp

    Filesize

    256KB

  • memory/984-923-0x0000000007390000-0x00000000073D0000-memory.dmp

    Filesize

    256KB

  • memory/984-924-0x0000000007390000-0x00000000073D0000-memory.dmp

    Filesize

    256KB

  • memory/984-926-0x0000000007390000-0x00000000073D0000-memory.dmp

    Filesize

    256KB