Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:47

General

  • Target

    1cce3d68213e4b4c38222f0919a48f90586c855bd6862e5d858019f420909429.exe

  • Size

    690KB

  • MD5

    a44ee6f4bad61d71454b4f47d57bc9a6

  • SHA1

    5c8992235c22145a20c6d7a1d8de138dda53ae29

  • SHA256

    1cce3d68213e4b4c38222f0919a48f90586c855bd6862e5d858019f420909429

  • SHA512

    4eed0dd85856c9778b5c52b9635b131132d7a43ad70c6018b8bfe3d4b37a7910787d18a17d20d0afa3efa0804aacc0843137094070dddab29b0659429ea61982

  • SSDEEP

    12288:Qy903lyWWYp11u5jExQB7zZIJ7nNDzKAkbEibrLar2p6KXTozIIMA0R:QysyW+jEQzZixWAkQib3ar2p6GTo2R

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cce3d68213e4b4c38222f0919a48f90586c855bd6862e5d858019f420909429.exe
    "C:\Users\Admin\AppData\Local\Temp\1cce3d68213e4b4c38222f0919a48f90586c855bd6862e5d858019f420909429.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un304453.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un304453.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23748940.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23748940.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601909.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601909.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un304453.exe

    Filesize

    536KB

    MD5

    dc4870bc7fc6ae5205c3ed033632abd6

    SHA1

    826607d8b6429976dd3d906b5ac3b3103a486d45

    SHA256

    4a74cea3c058e2155aa9280c2ec052cb0b614ea269ccd07054fbf8c36482a2f2

    SHA512

    cc36d52455821c206a393e16a3fcbdebc47d78d709418c68e2297001927c5ed54fb63d218b8cc5f99b77e965cece4fca905133024508d13419987373b84d954c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un304453.exe

    Filesize

    536KB

    MD5

    dc4870bc7fc6ae5205c3ed033632abd6

    SHA1

    826607d8b6429976dd3d906b5ac3b3103a486d45

    SHA256

    4a74cea3c058e2155aa9280c2ec052cb0b614ea269ccd07054fbf8c36482a2f2

    SHA512

    cc36d52455821c206a393e16a3fcbdebc47d78d709418c68e2297001927c5ed54fb63d218b8cc5f99b77e965cece4fca905133024508d13419987373b84d954c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23748940.exe

    Filesize

    259KB

    MD5

    26078c6d69495a84f1d088301dd2f726

    SHA1

    619991986eb620d3bb86d14dd987821556255c04

    SHA256

    607b43ed17969f1c21cf4b7e903f2d09c8567945a3f998c9b65fa85feb86a86f

    SHA512

    78a49a558da70af7eb6988cc045a6557d9542bc9c21dfe4750b5c407c6562501e45af12fe2ddf507ecd9aac7ba62b33ee4a2c6c32888ce9dae50eb96f3ee4fd5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23748940.exe

    Filesize

    259KB

    MD5

    26078c6d69495a84f1d088301dd2f726

    SHA1

    619991986eb620d3bb86d14dd987821556255c04

    SHA256

    607b43ed17969f1c21cf4b7e903f2d09c8567945a3f998c9b65fa85feb86a86f

    SHA512

    78a49a558da70af7eb6988cc045a6557d9542bc9c21dfe4750b5c407c6562501e45af12fe2ddf507ecd9aac7ba62b33ee4a2c6c32888ce9dae50eb96f3ee4fd5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23748940.exe

    Filesize

    259KB

    MD5

    26078c6d69495a84f1d088301dd2f726

    SHA1

    619991986eb620d3bb86d14dd987821556255c04

    SHA256

    607b43ed17969f1c21cf4b7e903f2d09c8567945a3f998c9b65fa85feb86a86f

    SHA512

    78a49a558da70af7eb6988cc045a6557d9542bc9c21dfe4750b5c407c6562501e45af12fe2ddf507ecd9aac7ba62b33ee4a2c6c32888ce9dae50eb96f3ee4fd5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601909.exe

    Filesize

    341KB

    MD5

    69b4d9dfb9309217c1b099c3ede1da75

    SHA1

    3758aa287facedb5152f32a282d9ea0af25d33d3

    SHA256

    ea7e46a65ac033ea5fe175ed2d9724183f79e114a4b4261da043c117ea86d59d

    SHA512

    f6bd6980690005618af9280ba6d24370aa8ec4f47cab49f5290e552049bf4cb53f8732e17e6704940f6831570ee825a7bbe86fe9b85f883bd2d0e87cb38dcab2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601909.exe

    Filesize

    341KB

    MD5

    69b4d9dfb9309217c1b099c3ede1da75

    SHA1

    3758aa287facedb5152f32a282d9ea0af25d33d3

    SHA256

    ea7e46a65ac033ea5fe175ed2d9724183f79e114a4b4261da043c117ea86d59d

    SHA512

    f6bd6980690005618af9280ba6d24370aa8ec4f47cab49f5290e552049bf4cb53f8732e17e6704940f6831570ee825a7bbe86fe9b85f883bd2d0e87cb38dcab2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601909.exe

    Filesize

    341KB

    MD5

    69b4d9dfb9309217c1b099c3ede1da75

    SHA1

    3758aa287facedb5152f32a282d9ea0af25d33d3

    SHA256

    ea7e46a65ac033ea5fe175ed2d9724183f79e114a4b4261da043c117ea86d59d

    SHA512

    f6bd6980690005618af9280ba6d24370aa8ec4f47cab49f5290e552049bf4cb53f8732e17e6704940f6831570ee825a7bbe86fe9b85f883bd2d0e87cb38dcab2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un304453.exe

    Filesize

    536KB

    MD5

    dc4870bc7fc6ae5205c3ed033632abd6

    SHA1

    826607d8b6429976dd3d906b5ac3b3103a486d45

    SHA256

    4a74cea3c058e2155aa9280c2ec052cb0b614ea269ccd07054fbf8c36482a2f2

    SHA512

    cc36d52455821c206a393e16a3fcbdebc47d78d709418c68e2297001927c5ed54fb63d218b8cc5f99b77e965cece4fca905133024508d13419987373b84d954c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un304453.exe

    Filesize

    536KB

    MD5

    dc4870bc7fc6ae5205c3ed033632abd6

    SHA1

    826607d8b6429976dd3d906b5ac3b3103a486d45

    SHA256

    4a74cea3c058e2155aa9280c2ec052cb0b614ea269ccd07054fbf8c36482a2f2

    SHA512

    cc36d52455821c206a393e16a3fcbdebc47d78d709418c68e2297001927c5ed54fb63d218b8cc5f99b77e965cece4fca905133024508d13419987373b84d954c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\23748940.exe

    Filesize

    259KB

    MD5

    26078c6d69495a84f1d088301dd2f726

    SHA1

    619991986eb620d3bb86d14dd987821556255c04

    SHA256

    607b43ed17969f1c21cf4b7e903f2d09c8567945a3f998c9b65fa85feb86a86f

    SHA512

    78a49a558da70af7eb6988cc045a6557d9542bc9c21dfe4750b5c407c6562501e45af12fe2ddf507ecd9aac7ba62b33ee4a2c6c32888ce9dae50eb96f3ee4fd5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\23748940.exe

    Filesize

    259KB

    MD5

    26078c6d69495a84f1d088301dd2f726

    SHA1

    619991986eb620d3bb86d14dd987821556255c04

    SHA256

    607b43ed17969f1c21cf4b7e903f2d09c8567945a3f998c9b65fa85feb86a86f

    SHA512

    78a49a558da70af7eb6988cc045a6557d9542bc9c21dfe4750b5c407c6562501e45af12fe2ddf507ecd9aac7ba62b33ee4a2c6c32888ce9dae50eb96f3ee4fd5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\23748940.exe

    Filesize

    259KB

    MD5

    26078c6d69495a84f1d088301dd2f726

    SHA1

    619991986eb620d3bb86d14dd987821556255c04

    SHA256

    607b43ed17969f1c21cf4b7e903f2d09c8567945a3f998c9b65fa85feb86a86f

    SHA512

    78a49a558da70af7eb6988cc045a6557d9542bc9c21dfe4750b5c407c6562501e45af12fe2ddf507ecd9aac7ba62b33ee4a2c6c32888ce9dae50eb96f3ee4fd5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601909.exe

    Filesize

    341KB

    MD5

    69b4d9dfb9309217c1b099c3ede1da75

    SHA1

    3758aa287facedb5152f32a282d9ea0af25d33d3

    SHA256

    ea7e46a65ac033ea5fe175ed2d9724183f79e114a4b4261da043c117ea86d59d

    SHA512

    f6bd6980690005618af9280ba6d24370aa8ec4f47cab49f5290e552049bf4cb53f8732e17e6704940f6831570ee825a7bbe86fe9b85f883bd2d0e87cb38dcab2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601909.exe

    Filesize

    341KB

    MD5

    69b4d9dfb9309217c1b099c3ede1da75

    SHA1

    3758aa287facedb5152f32a282d9ea0af25d33d3

    SHA256

    ea7e46a65ac033ea5fe175ed2d9724183f79e114a4b4261da043c117ea86d59d

    SHA512

    f6bd6980690005618af9280ba6d24370aa8ec4f47cab49f5290e552049bf4cb53f8732e17e6704940f6831570ee825a7bbe86fe9b85f883bd2d0e87cb38dcab2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk601909.exe

    Filesize

    341KB

    MD5

    69b4d9dfb9309217c1b099c3ede1da75

    SHA1

    3758aa287facedb5152f32a282d9ea0af25d33d3

    SHA256

    ea7e46a65ac033ea5fe175ed2d9724183f79e114a4b4261da043c117ea86d59d

    SHA512

    f6bd6980690005618af9280ba6d24370aa8ec4f47cab49f5290e552049bf4cb53f8732e17e6704940f6831570ee825a7bbe86fe9b85f883bd2d0e87cb38dcab2

  • memory/880-112-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/880-89-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-93-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-91-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-95-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-97-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-99-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-101-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-103-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-107-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-105-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-108-0x0000000000250000-0x000000000027D000-memory.dmp

    Filesize

    180KB

  • memory/880-109-0x0000000004AF0000-0x0000000004B30000-memory.dmp

    Filesize

    256KB

  • memory/880-110-0x0000000004AF0000-0x0000000004B30000-memory.dmp

    Filesize

    256KB

  • memory/880-111-0x0000000004AF0000-0x0000000004B30000-memory.dmp

    Filesize

    256KB

  • memory/880-87-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-113-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/880-85-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-83-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-81-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-80-0x0000000000870000-0x0000000000883000-memory.dmp

    Filesize

    76KB

  • memory/880-79-0x0000000000870000-0x0000000000888000-memory.dmp

    Filesize

    96KB

  • memory/880-78-0x0000000000850000-0x000000000086A000-memory.dmp

    Filesize

    104KB

  • memory/1676-126-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-147-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-124-0x0000000000960000-0x000000000099C000-memory.dmp

    Filesize

    240KB

  • memory/1676-127-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-129-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-131-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-133-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-135-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-141-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-139-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-137-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-143-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-145-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-125-0x0000000002330000-0x000000000236A000-memory.dmp

    Filesize

    232KB

  • memory/1676-149-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-151-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-153-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-155-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-157-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-159-0x0000000002330000-0x0000000002365000-memory.dmp

    Filesize

    212KB

  • memory/1676-370-0x0000000004920000-0x0000000004960000-memory.dmp

    Filesize

    256KB

  • memory/1676-368-0x0000000000530000-0x0000000000576000-memory.dmp

    Filesize

    280KB

  • memory/1676-372-0x0000000004920000-0x0000000004960000-memory.dmp

    Filesize

    256KB

  • memory/1676-922-0x0000000004920000-0x0000000004960000-memory.dmp

    Filesize

    256KB

  • memory/1676-923-0x0000000004920000-0x0000000004960000-memory.dmp

    Filesize

    256KB

  • memory/1676-925-0x0000000004920000-0x0000000004960000-memory.dmp

    Filesize

    256KB