Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2023, 14:11

General

  • Target

    6179e3fc829f3179ca82d746356df60d5606d03ef9f3c1663af0ef544f0716de.exe

  • Size

    1.7MB

  • MD5

    c039a4cc5e35ade799523bc2c0265883

  • SHA1

    957dafe38eff6028b598c7bb580f3c555df1f582

  • SHA256

    6179e3fc829f3179ca82d746356df60d5606d03ef9f3c1663af0ef544f0716de

  • SHA512

    3348701638fe766d6ccde15cd3bdae02008ceea02cb88a8e1fc52bf27d9ca6789932ffd153206cfa3c1b143e9e2836c61895c68c2acfcc17548c5ab8f7beea4e

  • SSDEEP

    49152:3tP86ikPBd2zeovMehfWMYQ6GAsxguzxe3mIXMNijt:BlJk5pOkAkguzxe/tjt

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6179e3fc829f3179ca82d746356df60d5606d03ef9f3c1663af0ef544f0716de.exe
    "C:\Users\Admin\AppData\Local\Temp\6179e3fc829f3179ca82d746356df60d5606d03ef9f3c1663af0ef544f0716de.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nB0ra41.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nB0ra41.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eM0ax54.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eM0ax54.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\PI2LW51.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\PI2LW51.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\EM8pI80.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\EM8pI80.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2572
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2828
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2788
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nB0ra41.exe

    Filesize

    1.6MB

    MD5

    fcb7f28afcafb49272a52159442468e5

    SHA1

    c11a29f1c4f0763cdd39804d2d9965a38faa67ff

    SHA256

    64084cd377218ae42bd66d081f5efa60eaa0b32bdae42dd3296fdec4aa650ff0

    SHA512

    213d2544798c048923128484c0c25112b5ad3148bd7d67000607dbde4b34ab80a1439a0ead344fa90e556f183db0b1efb731f67a4c4c8c999b0b329cf020c08e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nB0ra41.exe

    Filesize

    1.6MB

    MD5

    fcb7f28afcafb49272a52159442468e5

    SHA1

    c11a29f1c4f0763cdd39804d2d9965a38faa67ff

    SHA256

    64084cd377218ae42bd66d081f5efa60eaa0b32bdae42dd3296fdec4aa650ff0

    SHA512

    213d2544798c048923128484c0c25112b5ad3148bd7d67000607dbde4b34ab80a1439a0ead344fa90e556f183db0b1efb731f67a4c4c8c999b0b329cf020c08e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eM0ax54.exe

    Filesize

    1.4MB

    MD5

    cc01e1dc66abaeac1d7ba8d313077743

    SHA1

    9cc323264787f5f1c52ef77a5d7a557f1fb91294

    SHA256

    3301b997e312b6975579d52b2a8434b0a27414a0c3c51e32c7d8323a131a4bdb

    SHA512

    e9091bc729f1a1617fc862d5a3eaa3c43b07b833e1845f0d03e7b88cdd837c7a8144340afc48d85e7b462abb58c875eeb669b4fa1a5abd611d956467da84be48

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eM0ax54.exe

    Filesize

    1.4MB

    MD5

    cc01e1dc66abaeac1d7ba8d313077743

    SHA1

    9cc323264787f5f1c52ef77a5d7a557f1fb91294

    SHA256

    3301b997e312b6975579d52b2a8434b0a27414a0c3c51e32c7d8323a131a4bdb

    SHA512

    e9091bc729f1a1617fc862d5a3eaa3c43b07b833e1845f0d03e7b88cdd837c7a8144340afc48d85e7b462abb58c875eeb669b4fa1a5abd611d956467da84be48

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\PI2LW51.exe

    Filesize

    1.2MB

    MD5

    e526727d927460641e46220682f40df3

    SHA1

    019714c457b05643d3249e0ad98bfe347c3d8106

    SHA256

    9053c81c2b718e3c3dae6f50d5a60b3de9b3c1cd28c8d6e2acf53a573e80b078

    SHA512

    53101166a19d86a7a70e36200b43f52d3a3fde7a8d1578bce9c91b9f1630890d04cb5906c9d7daf11fa0faf14208c5fd1e1f65c405e81366d904402299f84289

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\PI2LW51.exe

    Filesize

    1.2MB

    MD5

    e526727d927460641e46220682f40df3

    SHA1

    019714c457b05643d3249e0ad98bfe347c3d8106

    SHA256

    9053c81c2b718e3c3dae6f50d5a60b3de9b3c1cd28c8d6e2acf53a573e80b078

    SHA512

    53101166a19d86a7a70e36200b43f52d3a3fde7a8d1578bce9c91b9f1630890d04cb5906c9d7daf11fa0faf14208c5fd1e1f65c405e81366d904402299f84289

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\EM8pI80.exe

    Filesize

    725KB

    MD5

    625e0ad5784bb864b44c0db48c976022

    SHA1

    5af9df5081ea1cdfbd7bcde4bfbaed3674e2178c

    SHA256

    d8b448768cae52775bb3be73f4f826b44fe44740ccd7199c11ca7c95d3bbd54a

    SHA512

    75b095c719f70d53b753f924a8fdf9b2d33725493d20981b8a1d3bf3f817931f7a50ce4784b3b0fb16cc426b36ab7aa417a4ab332e9f251b5b216aaf48595911

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\EM8pI80.exe

    Filesize

    725KB

    MD5

    625e0ad5784bb864b44c0db48c976022

    SHA1

    5af9df5081ea1cdfbd7bcde4bfbaed3674e2178c

    SHA256

    d8b448768cae52775bb3be73f4f826b44fe44740ccd7199c11ca7c95d3bbd54a

    SHA512

    75b095c719f70d53b753f924a8fdf9b2d33725493d20981b8a1d3bf3f817931f7a50ce4784b3b0fb16cc426b36ab7aa417a4ab332e9f251b5b216aaf48595911

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe

    Filesize

    1.8MB

    MD5

    ca7a5693b5b0e8b54d6dad6a5b1b86b5

    SHA1

    49da08ec9be5e002b0d22dd630182c3a905c76c7

    SHA256

    2d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12

    SHA512

    68ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe

    Filesize

    1.8MB

    MD5

    ca7a5693b5b0e8b54d6dad6a5b1b86b5

    SHA1

    49da08ec9be5e002b0d22dd630182c3a905c76c7

    SHA256

    2d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12

    SHA512

    68ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe

    Filesize

    1.8MB

    MD5

    ca7a5693b5b0e8b54d6dad6a5b1b86b5

    SHA1

    49da08ec9be5e002b0d22dd630182c3a905c76c7

    SHA256

    2d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12

    SHA512

    68ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\nB0ra41.exe

    Filesize

    1.6MB

    MD5

    fcb7f28afcafb49272a52159442468e5

    SHA1

    c11a29f1c4f0763cdd39804d2d9965a38faa67ff

    SHA256

    64084cd377218ae42bd66d081f5efa60eaa0b32bdae42dd3296fdec4aa650ff0

    SHA512

    213d2544798c048923128484c0c25112b5ad3148bd7d67000607dbde4b34ab80a1439a0ead344fa90e556f183db0b1efb731f67a4c4c8c999b0b329cf020c08e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\nB0ra41.exe

    Filesize

    1.6MB

    MD5

    fcb7f28afcafb49272a52159442468e5

    SHA1

    c11a29f1c4f0763cdd39804d2d9965a38faa67ff

    SHA256

    64084cd377218ae42bd66d081f5efa60eaa0b32bdae42dd3296fdec4aa650ff0

    SHA512

    213d2544798c048923128484c0c25112b5ad3148bd7d67000607dbde4b34ab80a1439a0ead344fa90e556f183db0b1efb731f67a4c4c8c999b0b329cf020c08e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\eM0ax54.exe

    Filesize

    1.4MB

    MD5

    cc01e1dc66abaeac1d7ba8d313077743

    SHA1

    9cc323264787f5f1c52ef77a5d7a557f1fb91294

    SHA256

    3301b997e312b6975579d52b2a8434b0a27414a0c3c51e32c7d8323a131a4bdb

    SHA512

    e9091bc729f1a1617fc862d5a3eaa3c43b07b833e1845f0d03e7b88cdd837c7a8144340afc48d85e7b462abb58c875eeb669b4fa1a5abd611d956467da84be48

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\eM0ax54.exe

    Filesize

    1.4MB

    MD5

    cc01e1dc66abaeac1d7ba8d313077743

    SHA1

    9cc323264787f5f1c52ef77a5d7a557f1fb91294

    SHA256

    3301b997e312b6975579d52b2a8434b0a27414a0c3c51e32c7d8323a131a4bdb

    SHA512

    e9091bc729f1a1617fc862d5a3eaa3c43b07b833e1845f0d03e7b88cdd837c7a8144340afc48d85e7b462abb58c875eeb669b4fa1a5abd611d956467da84be48

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\PI2LW51.exe

    Filesize

    1.2MB

    MD5

    e526727d927460641e46220682f40df3

    SHA1

    019714c457b05643d3249e0ad98bfe347c3d8106

    SHA256

    9053c81c2b718e3c3dae6f50d5a60b3de9b3c1cd28c8d6e2acf53a573e80b078

    SHA512

    53101166a19d86a7a70e36200b43f52d3a3fde7a8d1578bce9c91b9f1630890d04cb5906c9d7daf11fa0faf14208c5fd1e1f65c405e81366d904402299f84289

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\PI2LW51.exe

    Filesize

    1.2MB

    MD5

    e526727d927460641e46220682f40df3

    SHA1

    019714c457b05643d3249e0ad98bfe347c3d8106

    SHA256

    9053c81c2b718e3c3dae6f50d5a60b3de9b3c1cd28c8d6e2acf53a573e80b078

    SHA512

    53101166a19d86a7a70e36200b43f52d3a3fde7a8d1578bce9c91b9f1630890d04cb5906c9d7daf11fa0faf14208c5fd1e1f65c405e81366d904402299f84289

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\EM8pI80.exe

    Filesize

    725KB

    MD5

    625e0ad5784bb864b44c0db48c976022

    SHA1

    5af9df5081ea1cdfbd7bcde4bfbaed3674e2178c

    SHA256

    d8b448768cae52775bb3be73f4f826b44fe44740ccd7199c11ca7c95d3bbd54a

    SHA512

    75b095c719f70d53b753f924a8fdf9b2d33725493d20981b8a1d3bf3f817931f7a50ce4784b3b0fb16cc426b36ab7aa417a4ab332e9f251b5b216aaf48595911

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\EM8pI80.exe

    Filesize

    725KB

    MD5

    625e0ad5784bb864b44c0db48c976022

    SHA1

    5af9df5081ea1cdfbd7bcde4bfbaed3674e2178c

    SHA256

    d8b448768cae52775bb3be73f4f826b44fe44740ccd7199c11ca7c95d3bbd54a

    SHA512

    75b095c719f70d53b753f924a8fdf9b2d33725493d20981b8a1d3bf3f817931f7a50ce4784b3b0fb16cc426b36ab7aa417a4ab332e9f251b5b216aaf48595911

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe

    Filesize

    1.8MB

    MD5

    ca7a5693b5b0e8b54d6dad6a5b1b86b5

    SHA1

    49da08ec9be5e002b0d22dd630182c3a905c76c7

    SHA256

    2d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12

    SHA512

    68ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe

    Filesize

    1.8MB

    MD5

    ca7a5693b5b0e8b54d6dad6a5b1b86b5

    SHA1

    49da08ec9be5e002b0d22dd630182c3a905c76c7

    SHA256

    2d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12

    SHA512

    68ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe

    Filesize

    1.8MB

    MD5

    ca7a5693b5b0e8b54d6dad6a5b1b86b5

    SHA1

    49da08ec9be5e002b0d22dd630182c3a905c76c7

    SHA256

    2d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12

    SHA512

    68ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe

    Filesize

    1.8MB

    MD5

    ca7a5693b5b0e8b54d6dad6a5b1b86b5

    SHA1

    49da08ec9be5e002b0d22dd630182c3a905c76c7

    SHA256

    2d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12

    SHA512

    68ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe

    Filesize

    1.8MB

    MD5

    ca7a5693b5b0e8b54d6dad6a5b1b86b5

    SHA1

    49da08ec9be5e002b0d22dd630182c3a905c76c7

    SHA256

    2d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12

    SHA512

    68ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe

    Filesize

    1.8MB

    MD5

    ca7a5693b5b0e8b54d6dad6a5b1b86b5

    SHA1

    49da08ec9be5e002b0d22dd630182c3a905c76c7

    SHA256

    2d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12

    SHA512

    68ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1jY02LH7.exe

    Filesize

    1.8MB

    MD5

    ca7a5693b5b0e8b54d6dad6a5b1b86b5

    SHA1

    49da08ec9be5e002b0d22dd630182c3a905c76c7

    SHA256

    2d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12

    SHA512

    68ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158

  • memory/2788-58-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2788-60-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2788-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2788-62-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2788-64-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2788-56-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2788-55-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2788-54-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2788-53-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2788-69-0x0000000000450000-0x000000000046E000-memory.dmp

    Filesize

    120KB

  • memory/2788-70-0x0000000000490000-0x00000000004AC000-memory.dmp

    Filesize

    112KB

  • memory/2788-71-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-72-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-74-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-80-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-78-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-76-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-82-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-84-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-86-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-90-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-88-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-92-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-94-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-96-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB

  • memory/2788-98-0x0000000000490000-0x00000000004A6000-memory.dmp

    Filesize

    88KB