Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2023, 16:40

General

  • Target

    2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe

  • Size

    1.9MB

  • MD5

    a0e649f875205aeaa3f874a69a4a37b2

  • SHA1

    44b6540998a3406ffbaff397d162f019a815b514

  • SHA256

    2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8

  • SHA512

    84cbc799b5e2c8a945668d1670886f5c5e3e704185c261715c3a09ca4a2811466c510c55eb0984850242eb590c212180fd6d952ba2200b7c4c00948533f31f42

  • SSDEEP

    49152:w84Ccw0tMdYxUIaCo+AIn82qDOMA1x3zDEF3E4:w7naJIeRAP3zE

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2e2fcd933e4aee8b60e19a27e656ec7b3d047b0c8834a922482785541d848ab8exe_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nd1Gb69.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nd1Gb69.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zi3II92.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zi3II92.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YC1Kf17.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YC1Kf17.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2764
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2836
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2776
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nd1Gb69.exe

          Filesize

          1.7MB

          MD5

          a66d33474d0926b29d01ef886fd36172

          SHA1

          f12ff32269484cbc08c965e0f7ac58dbb897d242

          SHA256

          461cc0449691ddb312c7ce275414459e923fd5300c0e02dae136e68b69aa8562

          SHA512

          d493ef42a4b97b9a97f20c5cc4dd933f6e76df630fd6c38061068aeb54397b65f631a86f60842539404fd269e98349c56f7f673b03df362037d70bf34b368cb8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nd1Gb69.exe

          Filesize

          1.7MB

          MD5

          a66d33474d0926b29d01ef886fd36172

          SHA1

          f12ff32269484cbc08c965e0f7ac58dbb897d242

          SHA256

          461cc0449691ddb312c7ce275414459e923fd5300c0e02dae136e68b69aa8562

          SHA512

          d493ef42a4b97b9a97f20c5cc4dd933f6e76df630fd6c38061068aeb54397b65f631a86f60842539404fd269e98349c56f7f673b03df362037d70bf34b368cb8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zi3II92.exe

          Filesize

          1.2MB

          MD5

          7c729f48efcc49f7b55225f8c66d361e

          SHA1

          69f75b20f6f8957f8565d3e6661ed6da55271afc

          SHA256

          9938eb6a325d920a31f49f689be1c33e5f0fe50552371c18ea8869c822f23f5e

          SHA512

          4ee7b96477309717aa215285493c7e057e65d1537ade9053a06cd21d866deddbecbe1a724f0e754ad001bf4ac68a3659ba6dc0b4968c1f9f25d028ce132fe205

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zi3II92.exe

          Filesize

          1.2MB

          MD5

          7c729f48efcc49f7b55225f8c66d361e

          SHA1

          69f75b20f6f8957f8565d3e6661ed6da55271afc

          SHA256

          9938eb6a325d920a31f49f689be1c33e5f0fe50552371c18ea8869c822f23f5e

          SHA512

          4ee7b96477309717aa215285493c7e057e65d1537ade9053a06cd21d866deddbecbe1a724f0e754ad001bf4ac68a3659ba6dc0b4968c1f9f25d028ce132fe205

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YC1Kf17.exe

          Filesize

          748KB

          MD5

          cfdfd7540523c6fadf1c6b337a3312bc

          SHA1

          9c0e42b4a286d4816ea28457616033cf0dc6c8cd

          SHA256

          cbf63e969f5323ddaabd14b53a0161e6d0b954804505235c00739d764b4ed737

          SHA512

          44ac35d3ed307e820e65fc2bf9266c24d82b114ad508a7af2e0dd50a579c948813fc1fef8f418a9002d1a77e04ad606710b13168fa9e56be565c2119607d2edf

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YC1Kf17.exe

          Filesize

          748KB

          MD5

          cfdfd7540523c6fadf1c6b337a3312bc

          SHA1

          9c0e42b4a286d4816ea28457616033cf0dc6c8cd

          SHA256

          cbf63e969f5323ddaabd14b53a0161e6d0b954804505235c00739d764b4ed737

          SHA512

          44ac35d3ed307e820e65fc2bf9266c24d82b114ad508a7af2e0dd50a579c948813fc1fef8f418a9002d1a77e04ad606710b13168fa9e56be565c2119607d2edf

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe

          Filesize

          1.8MB

          MD5

          75bb4e4db499e0c66c7358cc80a98eb9

          SHA1

          9106c6dcb82780dfd4396e837921c5af1ab58ed7

          SHA256

          a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85

          SHA512

          0e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe

          Filesize

          1.8MB

          MD5

          75bb4e4db499e0c66c7358cc80a98eb9

          SHA1

          9106c6dcb82780dfd4396e837921c5af1ab58ed7

          SHA256

          a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85

          SHA512

          0e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe

          Filesize

          1.8MB

          MD5

          75bb4e4db499e0c66c7358cc80a98eb9

          SHA1

          9106c6dcb82780dfd4396e837921c5af1ab58ed7

          SHA256

          a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85

          SHA512

          0e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\nd1Gb69.exe

          Filesize

          1.7MB

          MD5

          a66d33474d0926b29d01ef886fd36172

          SHA1

          f12ff32269484cbc08c965e0f7ac58dbb897d242

          SHA256

          461cc0449691ddb312c7ce275414459e923fd5300c0e02dae136e68b69aa8562

          SHA512

          d493ef42a4b97b9a97f20c5cc4dd933f6e76df630fd6c38061068aeb54397b65f631a86f60842539404fd269e98349c56f7f673b03df362037d70bf34b368cb8

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\nd1Gb69.exe

          Filesize

          1.7MB

          MD5

          a66d33474d0926b29d01ef886fd36172

          SHA1

          f12ff32269484cbc08c965e0f7ac58dbb897d242

          SHA256

          461cc0449691ddb312c7ce275414459e923fd5300c0e02dae136e68b69aa8562

          SHA512

          d493ef42a4b97b9a97f20c5cc4dd933f6e76df630fd6c38061068aeb54397b65f631a86f60842539404fd269e98349c56f7f673b03df362037d70bf34b368cb8

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\zi3II92.exe

          Filesize

          1.2MB

          MD5

          7c729f48efcc49f7b55225f8c66d361e

          SHA1

          69f75b20f6f8957f8565d3e6661ed6da55271afc

          SHA256

          9938eb6a325d920a31f49f689be1c33e5f0fe50552371c18ea8869c822f23f5e

          SHA512

          4ee7b96477309717aa215285493c7e057e65d1537ade9053a06cd21d866deddbecbe1a724f0e754ad001bf4ac68a3659ba6dc0b4968c1f9f25d028ce132fe205

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\zi3II92.exe

          Filesize

          1.2MB

          MD5

          7c729f48efcc49f7b55225f8c66d361e

          SHA1

          69f75b20f6f8957f8565d3e6661ed6da55271afc

          SHA256

          9938eb6a325d920a31f49f689be1c33e5f0fe50552371c18ea8869c822f23f5e

          SHA512

          4ee7b96477309717aa215285493c7e057e65d1537ade9053a06cd21d866deddbecbe1a724f0e754ad001bf4ac68a3659ba6dc0b4968c1f9f25d028ce132fe205

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\YC1Kf17.exe

          Filesize

          748KB

          MD5

          cfdfd7540523c6fadf1c6b337a3312bc

          SHA1

          9c0e42b4a286d4816ea28457616033cf0dc6c8cd

          SHA256

          cbf63e969f5323ddaabd14b53a0161e6d0b954804505235c00739d764b4ed737

          SHA512

          44ac35d3ed307e820e65fc2bf9266c24d82b114ad508a7af2e0dd50a579c948813fc1fef8f418a9002d1a77e04ad606710b13168fa9e56be565c2119607d2edf

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\YC1Kf17.exe

          Filesize

          748KB

          MD5

          cfdfd7540523c6fadf1c6b337a3312bc

          SHA1

          9c0e42b4a286d4816ea28457616033cf0dc6c8cd

          SHA256

          cbf63e969f5323ddaabd14b53a0161e6d0b954804505235c00739d764b4ed737

          SHA512

          44ac35d3ed307e820e65fc2bf9266c24d82b114ad508a7af2e0dd50a579c948813fc1fef8f418a9002d1a77e04ad606710b13168fa9e56be565c2119607d2edf

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe

          Filesize

          1.8MB

          MD5

          75bb4e4db499e0c66c7358cc80a98eb9

          SHA1

          9106c6dcb82780dfd4396e837921c5af1ab58ed7

          SHA256

          a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85

          SHA512

          0e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe

          Filesize

          1.8MB

          MD5

          75bb4e4db499e0c66c7358cc80a98eb9

          SHA1

          9106c6dcb82780dfd4396e837921c5af1ab58ed7

          SHA256

          a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85

          SHA512

          0e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe

          Filesize

          1.8MB

          MD5

          75bb4e4db499e0c66c7358cc80a98eb9

          SHA1

          9106c6dcb82780dfd4396e837921c5af1ab58ed7

          SHA256

          a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85

          SHA512

          0e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe

          Filesize

          1.8MB

          MD5

          75bb4e4db499e0c66c7358cc80a98eb9

          SHA1

          9106c6dcb82780dfd4396e837921c5af1ab58ed7

          SHA256

          a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85

          SHA512

          0e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe

          Filesize

          1.8MB

          MD5

          75bb4e4db499e0c66c7358cc80a98eb9

          SHA1

          9106c6dcb82780dfd4396e837921c5af1ab58ed7

          SHA256

          a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85

          SHA512

          0e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe

          Filesize

          1.8MB

          MD5

          75bb4e4db499e0c66c7358cc80a98eb9

          SHA1

          9106c6dcb82780dfd4396e837921c5af1ab58ed7

          SHA256

          a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85

          SHA512

          0e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1FL14Hh9.exe

          Filesize

          1.8MB

          MD5

          75bb4e4db499e0c66c7358cc80a98eb9

          SHA1

          9106c6dcb82780dfd4396e837921c5af1ab58ed7

          SHA256

          a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85

          SHA512

          0e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220

        • memory/2776-49-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2776-63-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-47-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2776-51-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2776-53-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2776-46-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2776-45-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2776-44-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2776-57-0x0000000000590000-0x00000000005AE000-memory.dmp

          Filesize

          120KB

        • memory/2776-43-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2776-59-0x0000000000BB0000-0x0000000000BCC000-memory.dmp

          Filesize

          112KB

        • memory/2776-61-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-60-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-48-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2776-65-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-67-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-69-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-73-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-71-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-75-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-79-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-77-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-83-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-81-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-87-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB

        • memory/2776-85-0x0000000000BB0000-0x0000000000BC6000-memory.dmp

          Filesize

          88KB