Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2023, 17:26

General

  • Target

    806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe

  • Size

    1.8MB

  • MD5

    cc82f18bba5d84b4971e91fbf589097c

  • SHA1

    7c79e33c219d70f2bdf1ceb83ac991f1ed0e6c82

  • SHA256

    806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02

  • SHA512

    20acb22bac2a4bc5fea72952cd96762054ff07fb25469173fc81c2712c01c0eb430a16999424e6b4e0b452c1827ec06878a35807ab8e0460f24cbf80a55a3c5a

  • SSDEEP

    49152:9o/+pXFpPkE4xOfTt86+5mrs0+tbBOa75NflvUO/j++:G+VLPIOLC/001BOG5N9sOK+

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\806382ba6a570c3a61257612ab6d664635509c0dbfc3c675595869e40e8b3f02_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DD5sP61.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DD5sP61.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ji3Iu02.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ji3Iu02.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Pi5GB14.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Pi5GB14.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3004
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2728
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2580
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DD5sP61.exe

    Filesize

    1.7MB

    MD5

    d55ecd6f7e1abc01af1f8d39a44eeac3

    SHA1

    c6f4601efccc05ceeae067a5cf6f0f5d7700472b

    SHA256

    bd275df6968210196d123d3d973bc6c743f34cc4e2ae0a63e82449db2e78f6cf

    SHA512

    3d6cc4ac29602102579b45d8c6799d8e3a05c8649edde62458932a23211dbe75b2df621ff455aee9b6f18f8686c86cfc8f7981000dd5795d2e383b0910ded720

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DD5sP61.exe

    Filesize

    1.7MB

    MD5

    d55ecd6f7e1abc01af1f8d39a44eeac3

    SHA1

    c6f4601efccc05ceeae067a5cf6f0f5d7700472b

    SHA256

    bd275df6968210196d123d3d973bc6c743f34cc4e2ae0a63e82449db2e78f6cf

    SHA512

    3d6cc4ac29602102579b45d8c6799d8e3a05c8649edde62458932a23211dbe75b2df621ff455aee9b6f18f8686c86cfc8f7981000dd5795d2e383b0910ded720

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ji3Iu02.exe

    Filesize

    1.2MB

    MD5

    d849d56e4c245f83b4d6b8d8fe01df57

    SHA1

    e63633f351c897510a0ae4e36e053c0f46c4c20a

    SHA256

    3d0c849ae656a7a5d24bd2c5d921ad7d1c6d43e0db10b3f3133d40790b667adb

    SHA512

    d95d9d9aaedd15dcde36dc0d7c3afd1eefdf4bf8806e17b0078bacd1a50afbaec43f2a013cdb043094f8e03f974c66e5ad367ad2045fb0e321aa479bdc4bfddd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ji3Iu02.exe

    Filesize

    1.2MB

    MD5

    d849d56e4c245f83b4d6b8d8fe01df57

    SHA1

    e63633f351c897510a0ae4e36e053c0f46c4c20a

    SHA256

    3d0c849ae656a7a5d24bd2c5d921ad7d1c6d43e0db10b3f3133d40790b667adb

    SHA512

    d95d9d9aaedd15dcde36dc0d7c3afd1eefdf4bf8806e17b0078bacd1a50afbaec43f2a013cdb043094f8e03f974c66e5ad367ad2045fb0e321aa479bdc4bfddd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Pi5GB14.exe

    Filesize

    734KB

    MD5

    f03a9ade23cba172099218e18fd2fb0f

    SHA1

    be6cf64411529df80e0fc0fdd304c06476baa3cf

    SHA256

    831e31aa6cbbe76e2dc96bfcff5613c9de68996a7e9725574e39f09e7ef08164

    SHA512

    9e12297373c8c33ce9acf3fb8aa54a0efe91ece1e2c75b407fe1793b087c52ab3f18b657b6c55308955247b27027d6aa09acd9aa9226eeaf8d3dca7038170249

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Pi5GB14.exe

    Filesize

    734KB

    MD5

    f03a9ade23cba172099218e18fd2fb0f

    SHA1

    be6cf64411529df80e0fc0fdd304c06476baa3cf

    SHA256

    831e31aa6cbbe76e2dc96bfcff5613c9de68996a7e9725574e39f09e7ef08164

    SHA512

    9e12297373c8c33ce9acf3fb8aa54a0efe91ece1e2c75b407fe1793b087c52ab3f18b657b6c55308955247b27027d6aa09acd9aa9226eeaf8d3dca7038170249

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe

    Filesize

    1.8MB

    MD5

    55c019d7f24b0c2291b6297a999800ef

    SHA1

    9cb5e50da25f09c5f2e56d9ec645dfc1bcf00045

    SHA256

    6e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8

    SHA512

    9368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe

    Filesize

    1.8MB

    MD5

    55c019d7f24b0c2291b6297a999800ef

    SHA1

    9cb5e50da25f09c5f2e56d9ec645dfc1bcf00045

    SHA256

    6e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8

    SHA512

    9368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe

    Filesize

    1.8MB

    MD5

    55c019d7f24b0c2291b6297a999800ef

    SHA1

    9cb5e50da25f09c5f2e56d9ec645dfc1bcf00045

    SHA256

    6e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8

    SHA512

    9368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\DD5sP61.exe

    Filesize

    1.7MB

    MD5

    d55ecd6f7e1abc01af1f8d39a44eeac3

    SHA1

    c6f4601efccc05ceeae067a5cf6f0f5d7700472b

    SHA256

    bd275df6968210196d123d3d973bc6c743f34cc4e2ae0a63e82449db2e78f6cf

    SHA512

    3d6cc4ac29602102579b45d8c6799d8e3a05c8649edde62458932a23211dbe75b2df621ff455aee9b6f18f8686c86cfc8f7981000dd5795d2e383b0910ded720

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\DD5sP61.exe

    Filesize

    1.7MB

    MD5

    d55ecd6f7e1abc01af1f8d39a44eeac3

    SHA1

    c6f4601efccc05ceeae067a5cf6f0f5d7700472b

    SHA256

    bd275df6968210196d123d3d973bc6c743f34cc4e2ae0a63e82449db2e78f6cf

    SHA512

    3d6cc4ac29602102579b45d8c6799d8e3a05c8649edde62458932a23211dbe75b2df621ff455aee9b6f18f8686c86cfc8f7981000dd5795d2e383b0910ded720

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Ji3Iu02.exe

    Filesize

    1.2MB

    MD5

    d849d56e4c245f83b4d6b8d8fe01df57

    SHA1

    e63633f351c897510a0ae4e36e053c0f46c4c20a

    SHA256

    3d0c849ae656a7a5d24bd2c5d921ad7d1c6d43e0db10b3f3133d40790b667adb

    SHA512

    d95d9d9aaedd15dcde36dc0d7c3afd1eefdf4bf8806e17b0078bacd1a50afbaec43f2a013cdb043094f8e03f974c66e5ad367ad2045fb0e321aa479bdc4bfddd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Ji3Iu02.exe

    Filesize

    1.2MB

    MD5

    d849d56e4c245f83b4d6b8d8fe01df57

    SHA1

    e63633f351c897510a0ae4e36e053c0f46c4c20a

    SHA256

    3d0c849ae656a7a5d24bd2c5d921ad7d1c6d43e0db10b3f3133d40790b667adb

    SHA512

    d95d9d9aaedd15dcde36dc0d7c3afd1eefdf4bf8806e17b0078bacd1a50afbaec43f2a013cdb043094f8e03f974c66e5ad367ad2045fb0e321aa479bdc4bfddd

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Pi5GB14.exe

    Filesize

    734KB

    MD5

    f03a9ade23cba172099218e18fd2fb0f

    SHA1

    be6cf64411529df80e0fc0fdd304c06476baa3cf

    SHA256

    831e31aa6cbbe76e2dc96bfcff5613c9de68996a7e9725574e39f09e7ef08164

    SHA512

    9e12297373c8c33ce9acf3fb8aa54a0efe91ece1e2c75b407fe1793b087c52ab3f18b657b6c55308955247b27027d6aa09acd9aa9226eeaf8d3dca7038170249

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Pi5GB14.exe

    Filesize

    734KB

    MD5

    f03a9ade23cba172099218e18fd2fb0f

    SHA1

    be6cf64411529df80e0fc0fdd304c06476baa3cf

    SHA256

    831e31aa6cbbe76e2dc96bfcff5613c9de68996a7e9725574e39f09e7ef08164

    SHA512

    9e12297373c8c33ce9acf3fb8aa54a0efe91ece1e2c75b407fe1793b087c52ab3f18b657b6c55308955247b27027d6aa09acd9aa9226eeaf8d3dca7038170249

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe

    Filesize

    1.8MB

    MD5

    55c019d7f24b0c2291b6297a999800ef

    SHA1

    9cb5e50da25f09c5f2e56d9ec645dfc1bcf00045

    SHA256

    6e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8

    SHA512

    9368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe

    Filesize

    1.8MB

    MD5

    55c019d7f24b0c2291b6297a999800ef

    SHA1

    9cb5e50da25f09c5f2e56d9ec645dfc1bcf00045

    SHA256

    6e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8

    SHA512

    9368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe

    Filesize

    1.8MB

    MD5

    55c019d7f24b0c2291b6297a999800ef

    SHA1

    9cb5e50da25f09c5f2e56d9ec645dfc1bcf00045

    SHA256

    6e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8

    SHA512

    9368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe

    Filesize

    1.8MB

    MD5

    55c019d7f24b0c2291b6297a999800ef

    SHA1

    9cb5e50da25f09c5f2e56d9ec645dfc1bcf00045

    SHA256

    6e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8

    SHA512

    9368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe

    Filesize

    1.8MB

    MD5

    55c019d7f24b0c2291b6297a999800ef

    SHA1

    9cb5e50da25f09c5f2e56d9ec645dfc1bcf00045

    SHA256

    6e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8

    SHA512

    9368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe

    Filesize

    1.8MB

    MD5

    55c019d7f24b0c2291b6297a999800ef

    SHA1

    9cb5e50da25f09c5f2e56d9ec645dfc1bcf00045

    SHA256

    6e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8

    SHA512

    9368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1kv58Be7.exe

    Filesize

    1.8MB

    MD5

    55c019d7f24b0c2291b6297a999800ef

    SHA1

    9cb5e50da25f09c5f2e56d9ec645dfc1bcf00045

    SHA256

    6e306a8b8847f6415d5153276c6b94e683c9683d44409ae917ddd6d342e85ea8

    SHA512

    9368457e4e01356b5029de84303d043ec0fabe1476a6346bfe2b988c541e967b0234624bc8e2d8575e75bc7b0d42c0013262e7e772f34fe5c9906e1824c9725a

  • memory/2580-49-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2580-65-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-47-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2580-51-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2580-53-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2580-48-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2580-45-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2580-46-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2580-57-0x0000000000240000-0x000000000025E000-memory.dmp

    Filesize

    120KB

  • memory/2580-43-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2580-59-0x00000000003C0000-0x00000000003DC000-memory.dmp

    Filesize

    112KB

  • memory/2580-60-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-61-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-44-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2580-63-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-69-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-67-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-73-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-71-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-75-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-77-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-79-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-83-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-81-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-85-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2580-87-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB