Analysis

  • max time kernel
    255s
  • max time network
    342s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 21:07

General

  • Target

    2b52c099160f823946bb195e662c36a9f0938622d91be40d6d08a021c409b549.exe

  • Size

    674KB

  • MD5

    7f5d213cb5da614bae79dc55c5f7388d

  • SHA1

    1ef457921f68ce987eb83a020e594153f4a92873

  • SHA256

    2b52c099160f823946bb195e662c36a9f0938622d91be40d6d08a021c409b549

  • SHA512

    07caedbc460602331d898619700989ae3219d798196862045bb7ad83c9dd3955bdf31f8d2779ae8691cc320455e95bf4150085cd7de5af4e4f9cef4e39eace28

  • SSDEEP

    12288:Ay90G7cQB3i5iTkvy/YFhGxwPsk0gULPL4Kx8cr86oa7lw23qVh8ok:AyB753i5t6/YFIxwPsh/7L4KJxwwMxk

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b52c099160f823946bb195e662c36a9f0938622d91be40d6d08a021c409b549.exe
    "C:\Users\Admin\AppData\Local\Temp\2b52c099160f823946bb195e662c36a9f0938622d91be40d6d08a021c409b549.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st565474.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st565474.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53910562.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53910562.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp314966.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp314966.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st565474.exe

    Filesize

    519KB

    MD5

    1f9cdfd808c848a077ea9a3a0ec0c354

    SHA1

    88dff21276e5b1e75fa9c72a60e7536b6d60fe74

    SHA256

    83294c15538ef319add50b5ee4a93ea8f096813a395723e181d4fbb9b5828716

    SHA512

    4b6799c4d5bd72d87cce08b4512d77175eb83ec910ba2af8f93fe84dc268da8a8ea9898281fdbeb4f3c7d6aaab417795e58de95473d8967f7443e8337484d00c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st565474.exe

    Filesize

    519KB

    MD5

    1f9cdfd808c848a077ea9a3a0ec0c354

    SHA1

    88dff21276e5b1e75fa9c72a60e7536b6d60fe74

    SHA256

    83294c15538ef319add50b5ee4a93ea8f096813a395723e181d4fbb9b5828716

    SHA512

    4b6799c4d5bd72d87cce08b4512d77175eb83ec910ba2af8f93fe84dc268da8a8ea9898281fdbeb4f3c7d6aaab417795e58de95473d8967f7443e8337484d00c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53910562.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53910562.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp314966.exe

    Filesize

    415KB

    MD5

    3a35e4da6e1b8b0e5136f9449910bcbb

    SHA1

    33c5ac6ee651d1a00c37967c3515bae223a69c67

    SHA256

    9d0229f8a4fb8abee2782cb9696466ad3087fd00be8d343b56c6a24107d146c0

    SHA512

    44db765ad1882a9151ae02080069c06c8fe8ca424e04d3956f882b153f506998a3aa5d73f1e1318e33bf6175fee4e01388b4406fb1da099a0d002a6832a6432b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp314966.exe

    Filesize

    415KB

    MD5

    3a35e4da6e1b8b0e5136f9449910bcbb

    SHA1

    33c5ac6ee651d1a00c37967c3515bae223a69c67

    SHA256

    9d0229f8a4fb8abee2782cb9696466ad3087fd00be8d343b56c6a24107d146c0

    SHA512

    44db765ad1882a9151ae02080069c06c8fe8ca424e04d3956f882b153f506998a3aa5d73f1e1318e33bf6175fee4e01388b4406fb1da099a0d002a6832a6432b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp314966.exe

    Filesize

    415KB

    MD5

    3a35e4da6e1b8b0e5136f9449910bcbb

    SHA1

    33c5ac6ee651d1a00c37967c3515bae223a69c67

    SHA256

    9d0229f8a4fb8abee2782cb9696466ad3087fd00be8d343b56c6a24107d146c0

    SHA512

    44db765ad1882a9151ae02080069c06c8fe8ca424e04d3956f882b153f506998a3aa5d73f1e1318e33bf6175fee4e01388b4406fb1da099a0d002a6832a6432b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st565474.exe

    Filesize

    519KB

    MD5

    1f9cdfd808c848a077ea9a3a0ec0c354

    SHA1

    88dff21276e5b1e75fa9c72a60e7536b6d60fe74

    SHA256

    83294c15538ef319add50b5ee4a93ea8f096813a395723e181d4fbb9b5828716

    SHA512

    4b6799c4d5bd72d87cce08b4512d77175eb83ec910ba2af8f93fe84dc268da8a8ea9898281fdbeb4f3c7d6aaab417795e58de95473d8967f7443e8337484d00c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st565474.exe

    Filesize

    519KB

    MD5

    1f9cdfd808c848a077ea9a3a0ec0c354

    SHA1

    88dff21276e5b1e75fa9c72a60e7536b6d60fe74

    SHA256

    83294c15538ef319add50b5ee4a93ea8f096813a395723e181d4fbb9b5828716

    SHA512

    4b6799c4d5bd72d87cce08b4512d77175eb83ec910ba2af8f93fe84dc268da8a8ea9898281fdbeb4f3c7d6aaab417795e58de95473d8967f7443e8337484d00c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\53910562.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\53910562.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp314966.exe

    Filesize

    415KB

    MD5

    3a35e4da6e1b8b0e5136f9449910bcbb

    SHA1

    33c5ac6ee651d1a00c37967c3515bae223a69c67

    SHA256

    9d0229f8a4fb8abee2782cb9696466ad3087fd00be8d343b56c6a24107d146c0

    SHA512

    44db765ad1882a9151ae02080069c06c8fe8ca424e04d3956f882b153f506998a3aa5d73f1e1318e33bf6175fee4e01388b4406fb1da099a0d002a6832a6432b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp314966.exe

    Filesize

    415KB

    MD5

    3a35e4da6e1b8b0e5136f9449910bcbb

    SHA1

    33c5ac6ee651d1a00c37967c3515bae223a69c67

    SHA256

    9d0229f8a4fb8abee2782cb9696466ad3087fd00be8d343b56c6a24107d146c0

    SHA512

    44db765ad1882a9151ae02080069c06c8fe8ca424e04d3956f882b153f506998a3aa5d73f1e1318e33bf6175fee4e01388b4406fb1da099a0d002a6832a6432b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp314966.exe

    Filesize

    415KB

    MD5

    3a35e4da6e1b8b0e5136f9449910bcbb

    SHA1

    33c5ac6ee651d1a00c37967c3515bae223a69c67

    SHA256

    9d0229f8a4fb8abee2782cb9696466ad3087fd00be8d343b56c6a24107d146c0

    SHA512

    44db765ad1882a9151ae02080069c06c8fe8ca424e04d3956f882b153f506998a3aa5d73f1e1318e33bf6175fee4e01388b4406fb1da099a0d002a6832a6432b

  • memory/1484-99-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-93-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-90-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/1484-105-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-103-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-101-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-97-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-95-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-92-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/1484-89-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-85-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-83-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-79-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-107-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/1484-106-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/1484-108-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/1484-87-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-81-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-76-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-77-0x00000000005B0000-0x00000000005C3000-memory.dmp

    Filesize

    76KB

  • memory/1484-75-0x00000000005B0000-0x00000000005C8000-memory.dmp

    Filesize

    96KB

  • memory/1484-74-0x0000000000360000-0x000000000037A000-memory.dmp

    Filesize

    104KB

  • memory/1916-122-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-142-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-121-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-119-0x0000000002380000-0x00000000023BC000-memory.dmp

    Filesize

    240KB

  • memory/1916-124-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-126-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-129-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-131-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB

  • memory/1916-134-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB

  • memory/1916-133-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB

  • memory/1916-132-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-128-0x0000000000870000-0x00000000008B6000-memory.dmp

    Filesize

    280KB

  • memory/1916-136-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-138-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-140-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-120-0x00000000048E0000-0x000000000491A000-memory.dmp

    Filesize

    232KB

  • memory/1916-144-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-146-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-148-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-150-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-152-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-154-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-156-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-158-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-160-0x00000000048E0000-0x0000000004915000-memory.dmp

    Filesize

    212KB

  • memory/1916-918-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB

  • memory/1916-920-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB

  • memory/1916-921-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB

  • memory/1916-922-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB

  • memory/1916-923-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB