Analysis

  • max time kernel
    197s
  • max time network
    210s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:58

General

  • Target

    22edb778b008e41150d540dfbc7e496bdf82e65982d407bd530789762fc19b42.exe

  • Size

    1.5MB

  • MD5

    250cef989986b9e8f731dfb64f6bb2e4

  • SHA1

    725223351e87318ac2c587134a2fd20fd18aae75

  • SHA256

    22edb778b008e41150d540dfbc7e496bdf82e65982d407bd530789762fc19b42

  • SHA512

    0df5b3bc530ed77e7731f44fb11c8efaf8ee70a4103f5c6c235b091997f635b96f7104664eb08c2754c97a70f31bb4be78c5444c01f2bcc8c4f9bd29565a4133

  • SSDEEP

    49152:zlSekjJAPF9l91MDMS+v9eXdS9FA5GJ3PXv:4v1cP91MDMS+gXE9FA58fXv

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22edb778b008e41150d540dfbc7e496bdf82e65982d407bd530789762fc19b42.exe
    "C:\Users\Admin\AppData\Local\Temp\22edb778b008e41150d540dfbc7e496bdf82e65982d407bd530789762fc19b42.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1291409.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1291409.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9559602.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9559602.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4733754.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4733754.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1304
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9297989.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9297989.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1700
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5742836.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5742836.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1592
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9706753.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9706753.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1291409.exe

    Filesize

    1.4MB

    MD5

    cd4fbe1f3c5b2a2bf22dba2e091d15e9

    SHA1

    ee0045b5d788b09685d73638746d7415eb25d860

    SHA256

    72161b202121a4ef26efe071c3ca5cec9082a36a5702cb7bf0d6f69b4aef9ccb

    SHA512

    9234fe2f36f89a03d5d491615728ece50382178bd1e0ddaf879f1f8ec9e5177edb7eb3ae10ebe594156841ee0403156a5e1269429fdc0f5ca5059c23a8a92a4d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1291409.exe

    Filesize

    1.4MB

    MD5

    cd4fbe1f3c5b2a2bf22dba2e091d15e9

    SHA1

    ee0045b5d788b09685d73638746d7415eb25d860

    SHA256

    72161b202121a4ef26efe071c3ca5cec9082a36a5702cb7bf0d6f69b4aef9ccb

    SHA512

    9234fe2f36f89a03d5d491615728ece50382178bd1e0ddaf879f1f8ec9e5177edb7eb3ae10ebe594156841ee0403156a5e1269429fdc0f5ca5059c23a8a92a4d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9559602.exe

    Filesize

    912KB

    MD5

    ade317f0650b75956f964a5036cec1fb

    SHA1

    3fd59fbe3ec779a9ab8e459341c621dc72978986

    SHA256

    0d11413a4cde898755017ef414df7f6548084c3e3ea3bdd884d6fdc9efa63d21

    SHA512

    0fe76f354718559efdb171c40c623cfbc35d19a8bbc2e583aca7863f1ee46c2c2d5c85a925b2434ecc80770634449efee7a8feb5eb2403d92147a78a8ee4d832

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9559602.exe

    Filesize

    912KB

    MD5

    ade317f0650b75956f964a5036cec1fb

    SHA1

    3fd59fbe3ec779a9ab8e459341c621dc72978986

    SHA256

    0d11413a4cde898755017ef414df7f6548084c3e3ea3bdd884d6fdc9efa63d21

    SHA512

    0fe76f354718559efdb171c40c623cfbc35d19a8bbc2e583aca7863f1ee46c2c2d5c85a925b2434ecc80770634449efee7a8feb5eb2403d92147a78a8ee4d832

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4733754.exe

    Filesize

    708KB

    MD5

    0c963a8e996d8c3c16824aa888fcf76a

    SHA1

    1d4c7ed96b5a27fb5f01da1b0ed4b6dbbc53215e

    SHA256

    6daee176b1782e129b5c392ca9ae148132e047f3d78a27174141ceec63946790

    SHA512

    c1873a8f46eca1340f452931092baff105b11ffc4535e7e773b3542c096b4534b0f3307946fa0c1e724d63533722411665f6a48a86afc4995c11f6df6b93e7ab

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4733754.exe

    Filesize

    708KB

    MD5

    0c963a8e996d8c3c16824aa888fcf76a

    SHA1

    1d4c7ed96b5a27fb5f01da1b0ed4b6dbbc53215e

    SHA256

    6daee176b1782e129b5c392ca9ae148132e047f3d78a27174141ceec63946790

    SHA512

    c1873a8f46eca1340f452931092baff105b11ffc4535e7e773b3542c096b4534b0f3307946fa0c1e724d63533722411665f6a48a86afc4995c11f6df6b93e7ab

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9297989.exe

    Filesize

    417KB

    MD5

    a49ddf178910696eae22ee74e492b9e3

    SHA1

    d598fd1ede5326f2cdf6c20a77cf9d78bcd1d438

    SHA256

    0658bc9ea183d16417f9f357ada83df71ddcf169dfe36eede7150b5f23b35110

    SHA512

    3b5a8d220700433987a1f5c8356aed2b43f88590cc8af59022fa6be55cebe6f97fac09e83a4365a38aa65279f0cc67565919c28cf3e049f54c27c7206e492284

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9297989.exe

    Filesize

    417KB

    MD5

    a49ddf178910696eae22ee74e492b9e3

    SHA1

    d598fd1ede5326f2cdf6c20a77cf9d78bcd1d438

    SHA256

    0658bc9ea183d16417f9f357ada83df71ddcf169dfe36eede7150b5f23b35110

    SHA512

    3b5a8d220700433987a1f5c8356aed2b43f88590cc8af59022fa6be55cebe6f97fac09e83a4365a38aa65279f0cc67565919c28cf3e049f54c27c7206e492284

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5742836.exe

    Filesize

    360KB

    MD5

    9f2a65568562ff5e25c8cba0ccf8ed12

    SHA1

    2f81055bf3ada7290cd237abe89c73b6e29fc593

    SHA256

    d4c412b654ea3097f34d3c90ed2bd3f596c0910a94f15798f856781b444ba0d5

    SHA512

    d5a628564f5c184cc6370e90fd39fec7903f4e7a42f605aba7c348e52cca3ceb997fc5b4a3b9a9747072e7bba4de5f69276406e35ae0018dff3f8d943a5c377e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5742836.exe

    Filesize

    360KB

    MD5

    9f2a65568562ff5e25c8cba0ccf8ed12

    SHA1

    2f81055bf3ada7290cd237abe89c73b6e29fc593

    SHA256

    d4c412b654ea3097f34d3c90ed2bd3f596c0910a94f15798f856781b444ba0d5

    SHA512

    d5a628564f5c184cc6370e90fd39fec7903f4e7a42f605aba7c348e52cca3ceb997fc5b4a3b9a9747072e7bba4de5f69276406e35ae0018dff3f8d943a5c377e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5742836.exe

    Filesize

    360KB

    MD5

    9f2a65568562ff5e25c8cba0ccf8ed12

    SHA1

    2f81055bf3ada7290cd237abe89c73b6e29fc593

    SHA256

    d4c412b654ea3097f34d3c90ed2bd3f596c0910a94f15798f856781b444ba0d5

    SHA512

    d5a628564f5c184cc6370e90fd39fec7903f4e7a42f605aba7c348e52cca3ceb997fc5b4a3b9a9747072e7bba4de5f69276406e35ae0018dff3f8d943a5c377e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9706753.exe

    Filesize

    136KB

    MD5

    406b2ec8ab33bee3ef01e58bfb309e1c

    SHA1

    4f30ec245d5ee68d5f1188bebe75f4e3c0b01b19

    SHA256

    3661eb401301ea58ffe987f469c67d87e2b26b206ca613a6e5e8ae4240e33fe1

    SHA512

    cb071cc5673a9b8512147efccdf71c36985bfba58652be98b6e8731c8a80f1e52485e6cf5bd56edf980e491e22d2435c603cf3caec9fb49817310958fcfb8a87

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9706753.exe

    Filesize

    136KB

    MD5

    406b2ec8ab33bee3ef01e58bfb309e1c

    SHA1

    4f30ec245d5ee68d5f1188bebe75f4e3c0b01b19

    SHA256

    3661eb401301ea58ffe987f469c67d87e2b26b206ca613a6e5e8ae4240e33fe1

    SHA512

    cb071cc5673a9b8512147efccdf71c36985bfba58652be98b6e8731c8a80f1e52485e6cf5bd56edf980e491e22d2435c603cf3caec9fb49817310958fcfb8a87

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1291409.exe

    Filesize

    1.4MB

    MD5

    cd4fbe1f3c5b2a2bf22dba2e091d15e9

    SHA1

    ee0045b5d788b09685d73638746d7415eb25d860

    SHA256

    72161b202121a4ef26efe071c3ca5cec9082a36a5702cb7bf0d6f69b4aef9ccb

    SHA512

    9234fe2f36f89a03d5d491615728ece50382178bd1e0ddaf879f1f8ec9e5177edb7eb3ae10ebe594156841ee0403156a5e1269429fdc0f5ca5059c23a8a92a4d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1291409.exe

    Filesize

    1.4MB

    MD5

    cd4fbe1f3c5b2a2bf22dba2e091d15e9

    SHA1

    ee0045b5d788b09685d73638746d7415eb25d860

    SHA256

    72161b202121a4ef26efe071c3ca5cec9082a36a5702cb7bf0d6f69b4aef9ccb

    SHA512

    9234fe2f36f89a03d5d491615728ece50382178bd1e0ddaf879f1f8ec9e5177edb7eb3ae10ebe594156841ee0403156a5e1269429fdc0f5ca5059c23a8a92a4d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9559602.exe

    Filesize

    912KB

    MD5

    ade317f0650b75956f964a5036cec1fb

    SHA1

    3fd59fbe3ec779a9ab8e459341c621dc72978986

    SHA256

    0d11413a4cde898755017ef414df7f6548084c3e3ea3bdd884d6fdc9efa63d21

    SHA512

    0fe76f354718559efdb171c40c623cfbc35d19a8bbc2e583aca7863f1ee46c2c2d5c85a925b2434ecc80770634449efee7a8feb5eb2403d92147a78a8ee4d832

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9559602.exe

    Filesize

    912KB

    MD5

    ade317f0650b75956f964a5036cec1fb

    SHA1

    3fd59fbe3ec779a9ab8e459341c621dc72978986

    SHA256

    0d11413a4cde898755017ef414df7f6548084c3e3ea3bdd884d6fdc9efa63d21

    SHA512

    0fe76f354718559efdb171c40c623cfbc35d19a8bbc2e583aca7863f1ee46c2c2d5c85a925b2434ecc80770634449efee7a8feb5eb2403d92147a78a8ee4d832

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4733754.exe

    Filesize

    708KB

    MD5

    0c963a8e996d8c3c16824aa888fcf76a

    SHA1

    1d4c7ed96b5a27fb5f01da1b0ed4b6dbbc53215e

    SHA256

    6daee176b1782e129b5c392ca9ae148132e047f3d78a27174141ceec63946790

    SHA512

    c1873a8f46eca1340f452931092baff105b11ffc4535e7e773b3542c096b4534b0f3307946fa0c1e724d63533722411665f6a48a86afc4995c11f6df6b93e7ab

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4733754.exe

    Filesize

    708KB

    MD5

    0c963a8e996d8c3c16824aa888fcf76a

    SHA1

    1d4c7ed96b5a27fb5f01da1b0ed4b6dbbc53215e

    SHA256

    6daee176b1782e129b5c392ca9ae148132e047f3d78a27174141ceec63946790

    SHA512

    c1873a8f46eca1340f452931092baff105b11ffc4535e7e773b3542c096b4534b0f3307946fa0c1e724d63533722411665f6a48a86afc4995c11f6df6b93e7ab

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v9297989.exe

    Filesize

    417KB

    MD5

    a49ddf178910696eae22ee74e492b9e3

    SHA1

    d598fd1ede5326f2cdf6c20a77cf9d78bcd1d438

    SHA256

    0658bc9ea183d16417f9f357ada83df71ddcf169dfe36eede7150b5f23b35110

    SHA512

    3b5a8d220700433987a1f5c8356aed2b43f88590cc8af59022fa6be55cebe6f97fac09e83a4365a38aa65279f0cc67565919c28cf3e049f54c27c7206e492284

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v9297989.exe

    Filesize

    417KB

    MD5

    a49ddf178910696eae22ee74e492b9e3

    SHA1

    d598fd1ede5326f2cdf6c20a77cf9d78bcd1d438

    SHA256

    0658bc9ea183d16417f9f357ada83df71ddcf169dfe36eede7150b5f23b35110

    SHA512

    3b5a8d220700433987a1f5c8356aed2b43f88590cc8af59022fa6be55cebe6f97fac09e83a4365a38aa65279f0cc67565919c28cf3e049f54c27c7206e492284

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5742836.exe

    Filesize

    360KB

    MD5

    9f2a65568562ff5e25c8cba0ccf8ed12

    SHA1

    2f81055bf3ada7290cd237abe89c73b6e29fc593

    SHA256

    d4c412b654ea3097f34d3c90ed2bd3f596c0910a94f15798f856781b444ba0d5

    SHA512

    d5a628564f5c184cc6370e90fd39fec7903f4e7a42f605aba7c348e52cca3ceb997fc5b4a3b9a9747072e7bba4de5f69276406e35ae0018dff3f8d943a5c377e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5742836.exe

    Filesize

    360KB

    MD5

    9f2a65568562ff5e25c8cba0ccf8ed12

    SHA1

    2f81055bf3ada7290cd237abe89c73b6e29fc593

    SHA256

    d4c412b654ea3097f34d3c90ed2bd3f596c0910a94f15798f856781b444ba0d5

    SHA512

    d5a628564f5c184cc6370e90fd39fec7903f4e7a42f605aba7c348e52cca3ceb997fc5b4a3b9a9747072e7bba4de5f69276406e35ae0018dff3f8d943a5c377e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5742836.exe

    Filesize

    360KB

    MD5

    9f2a65568562ff5e25c8cba0ccf8ed12

    SHA1

    2f81055bf3ada7290cd237abe89c73b6e29fc593

    SHA256

    d4c412b654ea3097f34d3c90ed2bd3f596c0910a94f15798f856781b444ba0d5

    SHA512

    d5a628564f5c184cc6370e90fd39fec7903f4e7a42f605aba7c348e52cca3ceb997fc5b4a3b9a9747072e7bba4de5f69276406e35ae0018dff3f8d943a5c377e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b9706753.exe

    Filesize

    136KB

    MD5

    406b2ec8ab33bee3ef01e58bfb309e1c

    SHA1

    4f30ec245d5ee68d5f1188bebe75f4e3c0b01b19

    SHA256

    3661eb401301ea58ffe987f469c67d87e2b26b206ca613a6e5e8ae4240e33fe1

    SHA512

    cb071cc5673a9b8512147efccdf71c36985bfba58652be98b6e8731c8a80f1e52485e6cf5bd56edf980e491e22d2435c603cf3caec9fb49817310958fcfb8a87

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b9706753.exe

    Filesize

    136KB

    MD5

    406b2ec8ab33bee3ef01e58bfb309e1c

    SHA1

    4f30ec245d5ee68d5f1188bebe75f4e3c0b01b19

    SHA256

    3661eb401301ea58ffe987f469c67d87e2b26b206ca613a6e5e8ae4240e33fe1

    SHA512

    cb071cc5673a9b8512147efccdf71c36985bfba58652be98b6e8731c8a80f1e52485e6cf5bd56edf980e491e22d2435c603cf3caec9fb49817310958fcfb8a87

  • memory/1532-154-0x0000000007060000-0x00000000070A0000-memory.dmp

    Filesize

    256KB

  • memory/1532-153-0x0000000007060000-0x00000000070A0000-memory.dmp

    Filesize

    256KB

  • memory/1532-152-0x0000000000AA0000-0x0000000000AC8000-memory.dmp

    Filesize

    160KB

  • memory/1592-112-0x0000000004B90000-0x0000000004BD0000-memory.dmp

    Filesize

    256KB

  • memory/1592-118-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-120-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-122-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-124-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-126-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-128-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-130-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-132-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-134-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-136-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-138-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-140-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-141-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/1592-142-0x0000000004B90000-0x0000000004BD0000-memory.dmp

    Filesize

    256KB

  • memory/1592-145-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/1592-116-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-114-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-113-0x00000000007E0000-0x00000000007F2000-memory.dmp

    Filesize

    72KB

  • memory/1592-111-0x0000000004B90000-0x0000000004BD0000-memory.dmp

    Filesize

    256KB

  • memory/1592-110-0x0000000000250000-0x000000000027D000-memory.dmp

    Filesize

    180KB

  • memory/1592-109-0x00000000007E0000-0x00000000007F8000-memory.dmp

    Filesize

    96KB

  • memory/1592-108-0x00000000007B0000-0x00000000007CA000-memory.dmp

    Filesize

    104KB