Analysis

  • max time kernel
    145s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:09

General

  • Target

    2dd47ef3617241eb143b305c79903af25b8133789f41f3f932254b60f8cdf9bc.exe

  • Size

    697KB

  • MD5

    6cfe592ebbafb471c44000cf0c66ea3c

  • SHA1

    8a21f8ef82db393e1fce2b728c94bfb594e468bb

  • SHA256

    2dd47ef3617241eb143b305c79903af25b8133789f41f3f932254b60f8cdf9bc

  • SHA512

    6204ab02de2416ec5297c2620d4e58131649835988c45c5753c54240ed87c7d3bb44e032be02c7cc05ac4c8531349241b677023748d1f58502acec448f23a6e6

  • SSDEEP

    12288:Wy90nTr9TWlxFLNCXZIpGmq0CvAj1WjGtJcWmEbQFTdbfa4Jq9JhFK+k:WyWTr96lxxNgZSGmqiUjkJEPTVd+hlk

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dd47ef3617241eb143b305c79903af25b8133789f41f3f932254b60f8cdf9bc.exe
    "C:\Users\Admin\AppData\Local\Temp\2dd47ef3617241eb143b305c79903af25b8133789f41f3f932254b60f8cdf9bc.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un495235.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un495235.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78248396.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78248396.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk693393.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk693393.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1792

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un495235.exe

          Filesize

          542KB

          MD5

          3855fd201608037d96d2d43d1560c683

          SHA1

          aad03e9c6d8becc65300c9ff34a6ffbe58fb7188

          SHA256

          90a2bfc9c3495cefca57978d7a32f8b74d55afcb5e023bd5238eca0cf8151e19

          SHA512

          36da82beeef42de77bdae77b4b2e845db3c88e8ee051e6071de43e340b1d2b9b068e277059dd93ba6e867c7dfc64a003f91d3091c7cb6616463b3e5cc6257b5a

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un495235.exe

          Filesize

          542KB

          MD5

          3855fd201608037d96d2d43d1560c683

          SHA1

          aad03e9c6d8becc65300c9ff34a6ffbe58fb7188

          SHA256

          90a2bfc9c3495cefca57978d7a32f8b74d55afcb5e023bd5238eca0cf8151e19

          SHA512

          36da82beeef42de77bdae77b4b2e845db3c88e8ee051e6071de43e340b1d2b9b068e277059dd93ba6e867c7dfc64a003f91d3091c7cb6616463b3e5cc6257b5a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78248396.exe

          Filesize

          263KB

          MD5

          803fab3ea3542682353259fedf2af36b

          SHA1

          e542c15f278966a8e55a7aea01faf4f6a57791ea

          SHA256

          9262917e1a245f1d97a25c4a6d6be0e88406daa24ee7784ee6a641880c24d02e

          SHA512

          b162e7eef0e258145205c6c9de327ed5c5687f895c974861bd34d70a3f6329dd68364c2758032bf93bccbad7d8e7e27018ccc13cd9afbed66a72eeead6ff4fd3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78248396.exe

          Filesize

          263KB

          MD5

          803fab3ea3542682353259fedf2af36b

          SHA1

          e542c15f278966a8e55a7aea01faf4f6a57791ea

          SHA256

          9262917e1a245f1d97a25c4a6d6be0e88406daa24ee7784ee6a641880c24d02e

          SHA512

          b162e7eef0e258145205c6c9de327ed5c5687f895c974861bd34d70a3f6329dd68364c2758032bf93bccbad7d8e7e27018ccc13cd9afbed66a72eeead6ff4fd3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78248396.exe

          Filesize

          263KB

          MD5

          803fab3ea3542682353259fedf2af36b

          SHA1

          e542c15f278966a8e55a7aea01faf4f6a57791ea

          SHA256

          9262917e1a245f1d97a25c4a6d6be0e88406daa24ee7784ee6a641880c24d02e

          SHA512

          b162e7eef0e258145205c6c9de327ed5c5687f895c974861bd34d70a3f6329dd68364c2758032bf93bccbad7d8e7e27018ccc13cd9afbed66a72eeead6ff4fd3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk693393.exe

          Filesize

          328KB

          MD5

          3598d738b347996a385397082bc57d9f

          SHA1

          6cdb1dced64775722835b7c043ca69d25c369697

          SHA256

          1c4e1046e560296fbcfec3f13638457f0a193b295041a6b68aec273456a15af5

          SHA512

          05b2ff197b7fcc60742a2f8e04e7276e7f155ebfaa1b4024ff4ab5adfc8f118ab3f0c86719ad06a581f3a709e604dcda682ff991d724b951a61b2b338b7b8766

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk693393.exe

          Filesize

          328KB

          MD5

          3598d738b347996a385397082bc57d9f

          SHA1

          6cdb1dced64775722835b7c043ca69d25c369697

          SHA256

          1c4e1046e560296fbcfec3f13638457f0a193b295041a6b68aec273456a15af5

          SHA512

          05b2ff197b7fcc60742a2f8e04e7276e7f155ebfaa1b4024ff4ab5adfc8f118ab3f0c86719ad06a581f3a709e604dcda682ff991d724b951a61b2b338b7b8766

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk693393.exe

          Filesize

          328KB

          MD5

          3598d738b347996a385397082bc57d9f

          SHA1

          6cdb1dced64775722835b7c043ca69d25c369697

          SHA256

          1c4e1046e560296fbcfec3f13638457f0a193b295041a6b68aec273456a15af5

          SHA512

          05b2ff197b7fcc60742a2f8e04e7276e7f155ebfaa1b4024ff4ab5adfc8f118ab3f0c86719ad06a581f3a709e604dcda682ff991d724b951a61b2b338b7b8766

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un495235.exe

          Filesize

          542KB

          MD5

          3855fd201608037d96d2d43d1560c683

          SHA1

          aad03e9c6d8becc65300c9ff34a6ffbe58fb7188

          SHA256

          90a2bfc9c3495cefca57978d7a32f8b74d55afcb5e023bd5238eca0cf8151e19

          SHA512

          36da82beeef42de77bdae77b4b2e845db3c88e8ee051e6071de43e340b1d2b9b068e277059dd93ba6e867c7dfc64a003f91d3091c7cb6616463b3e5cc6257b5a

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un495235.exe

          Filesize

          542KB

          MD5

          3855fd201608037d96d2d43d1560c683

          SHA1

          aad03e9c6d8becc65300c9ff34a6ffbe58fb7188

          SHA256

          90a2bfc9c3495cefca57978d7a32f8b74d55afcb5e023bd5238eca0cf8151e19

          SHA512

          36da82beeef42de77bdae77b4b2e845db3c88e8ee051e6071de43e340b1d2b9b068e277059dd93ba6e867c7dfc64a003f91d3091c7cb6616463b3e5cc6257b5a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\78248396.exe

          Filesize

          263KB

          MD5

          803fab3ea3542682353259fedf2af36b

          SHA1

          e542c15f278966a8e55a7aea01faf4f6a57791ea

          SHA256

          9262917e1a245f1d97a25c4a6d6be0e88406daa24ee7784ee6a641880c24d02e

          SHA512

          b162e7eef0e258145205c6c9de327ed5c5687f895c974861bd34d70a3f6329dd68364c2758032bf93bccbad7d8e7e27018ccc13cd9afbed66a72eeead6ff4fd3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\78248396.exe

          Filesize

          263KB

          MD5

          803fab3ea3542682353259fedf2af36b

          SHA1

          e542c15f278966a8e55a7aea01faf4f6a57791ea

          SHA256

          9262917e1a245f1d97a25c4a6d6be0e88406daa24ee7784ee6a641880c24d02e

          SHA512

          b162e7eef0e258145205c6c9de327ed5c5687f895c974861bd34d70a3f6329dd68364c2758032bf93bccbad7d8e7e27018ccc13cd9afbed66a72eeead6ff4fd3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\78248396.exe

          Filesize

          263KB

          MD5

          803fab3ea3542682353259fedf2af36b

          SHA1

          e542c15f278966a8e55a7aea01faf4f6a57791ea

          SHA256

          9262917e1a245f1d97a25c4a6d6be0e88406daa24ee7784ee6a641880c24d02e

          SHA512

          b162e7eef0e258145205c6c9de327ed5c5687f895c974861bd34d70a3f6329dd68364c2758032bf93bccbad7d8e7e27018ccc13cd9afbed66a72eeead6ff4fd3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk693393.exe

          Filesize

          328KB

          MD5

          3598d738b347996a385397082bc57d9f

          SHA1

          6cdb1dced64775722835b7c043ca69d25c369697

          SHA256

          1c4e1046e560296fbcfec3f13638457f0a193b295041a6b68aec273456a15af5

          SHA512

          05b2ff197b7fcc60742a2f8e04e7276e7f155ebfaa1b4024ff4ab5adfc8f118ab3f0c86719ad06a581f3a709e604dcda682ff991d724b951a61b2b338b7b8766

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk693393.exe

          Filesize

          328KB

          MD5

          3598d738b347996a385397082bc57d9f

          SHA1

          6cdb1dced64775722835b7c043ca69d25c369697

          SHA256

          1c4e1046e560296fbcfec3f13638457f0a193b295041a6b68aec273456a15af5

          SHA512

          05b2ff197b7fcc60742a2f8e04e7276e7f155ebfaa1b4024ff4ab5adfc8f118ab3f0c86719ad06a581f3a709e604dcda682ff991d724b951a61b2b338b7b8766

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk693393.exe

          Filesize

          328KB

          MD5

          3598d738b347996a385397082bc57d9f

          SHA1

          6cdb1dced64775722835b7c043ca69d25c369697

          SHA256

          1c4e1046e560296fbcfec3f13638457f0a193b295041a6b68aec273456a15af5

          SHA512

          05b2ff197b7fcc60742a2f8e04e7276e7f155ebfaa1b4024ff4ab5adfc8f118ab3f0c86719ad06a581f3a709e604dcda682ff991d724b951a61b2b338b7b8766

        • memory/1324-111-0x0000000007400000-0x0000000007440000-memory.dmp

          Filesize

          256KB

        • memory/1324-87-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-89-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-91-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-95-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-93-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-99-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-97-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-103-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-101-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-107-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-105-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-109-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-110-0x0000000007400000-0x0000000007440000-memory.dmp

          Filesize

          256KB

        • memory/1324-85-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-114-0x0000000000400000-0x0000000002B99000-memory.dmp

          Filesize

          39.6MB

        • memory/1324-83-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-82-0x0000000002CA0000-0x0000000002CB3000-memory.dmp

          Filesize

          76KB

        • memory/1324-81-0x0000000002CA0000-0x0000000002CB8000-memory.dmp

          Filesize

          96KB

        • memory/1324-80-0x0000000002BE0000-0x0000000002BFA000-memory.dmp

          Filesize

          104KB

        • memory/1324-79-0x0000000000400000-0x0000000002B99000-memory.dmp

          Filesize

          39.6MB

        • memory/1324-78-0x0000000000280000-0x00000000002AD000-memory.dmp

          Filesize

          180KB

        • memory/1792-126-0x0000000004920000-0x000000000495A000-memory.dmp

          Filesize

          232KB

        • memory/1792-148-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-127-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-128-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-130-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-132-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-134-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-136-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-138-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-142-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-140-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-144-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-146-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-125-0x00000000046C0000-0x00000000046FC000-memory.dmp

          Filesize

          240KB

        • memory/1792-150-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-151-0x00000000002D0000-0x0000000000316000-memory.dmp

          Filesize

          280KB

        • memory/1792-154-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-153-0x0000000007210000-0x0000000007250000-memory.dmp

          Filesize

          256KB

        • memory/1792-155-0x0000000007210000-0x0000000007250000-memory.dmp

          Filesize

          256KB

        • memory/1792-157-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-159-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-161-0x0000000004920000-0x0000000004955000-memory.dmp

          Filesize

          212KB

        • memory/1792-922-0x0000000007210000-0x0000000007250000-memory.dmp

          Filesize

          256KB

        • memory/1792-925-0x0000000007210000-0x0000000007250000-memory.dmp

          Filesize

          256KB

        • memory/1792-926-0x0000000007210000-0x0000000007250000-memory.dmp

          Filesize

          256KB