Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 10:51

General

  • Target

    4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe

  • Size

    1.8MB

  • MD5

    169b6a20fea6f9c6e68eb87e4a07db0d

  • SHA1

    126fe5d3b39d0e1ae549edbc5e4b615db11454e7

  • SHA256

    4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150

  • SHA512

    967b70bc4073a949659d765e74786a94d77688123856c381c4a6462976a9bab3b9d6634512bf1b4d24d067373ccdb7a422600ad6c687325cf504191e12eb01b1

  • SSDEEP

    49152:qFV8hLZda2Oxs537fOhRnjekVYZcsRCOpulN/H:MV8LZ/+98ZcsIOpOF

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe
    "C:\Users\Admin\AppData\Local\Temp\4beaa05abbc9c61649f59a90870cf295699f35a90c02b4059a220bb281ca4150.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Da1MZ02.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Da1MZ02.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uw0Ic44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uw0Ic44.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\LK3xq94.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\LK3xq94.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2120
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2784
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2484
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Da1MZ02.exe

    Filesize

    1.7MB

    MD5

    b237ee777ed80e71fcaac3db3003cc57

    SHA1

    3b3f8be131b830655c6620c46bfeeef91c231e19

    SHA256

    900e1db8b6ba7515204c06a41fb53a3b58b593bdcdd1d5fb70c5136716bd4390

    SHA512

    0cdfc345187fe6c9cecd09d33d01917922527c8d40c52ada13840a6b67cc18bd175fc74ecd9762bec8e47dfbf7e67b49d7105496c299030d0eb42b7163f36f9a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Da1MZ02.exe

    Filesize

    1.7MB

    MD5

    b237ee777ed80e71fcaac3db3003cc57

    SHA1

    3b3f8be131b830655c6620c46bfeeef91c231e19

    SHA256

    900e1db8b6ba7515204c06a41fb53a3b58b593bdcdd1d5fb70c5136716bd4390

    SHA512

    0cdfc345187fe6c9cecd09d33d01917922527c8d40c52ada13840a6b67cc18bd175fc74ecd9762bec8e47dfbf7e67b49d7105496c299030d0eb42b7163f36f9a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uw0Ic44.exe

    Filesize

    1.2MB

    MD5

    c9ce1186e23400bb11d422517d716bea

    SHA1

    85a6c17373c8094f2bb156f4fc2c158ed3e0ffda

    SHA256

    c197bdf0a605c34d9bc3e966b9095b39247b83aa4c444199476ab837788daca3

    SHA512

    04664aa30b70b6b783d36f8fbc9118f912d6c28df3dafa60a83d95a6aa6b64364f8fbdba23c3a802f71e16195ee6a4fceb5794d600abd9a772da634eebecbdf1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uw0Ic44.exe

    Filesize

    1.2MB

    MD5

    c9ce1186e23400bb11d422517d716bea

    SHA1

    85a6c17373c8094f2bb156f4fc2c158ed3e0ffda

    SHA256

    c197bdf0a605c34d9bc3e966b9095b39247b83aa4c444199476ab837788daca3

    SHA512

    04664aa30b70b6b783d36f8fbc9118f912d6c28df3dafa60a83d95a6aa6b64364f8fbdba23c3a802f71e16195ee6a4fceb5794d600abd9a772da634eebecbdf1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\LK3xq94.exe

    Filesize

    732KB

    MD5

    2548cd0e30f2677ba53186fa823fe50f

    SHA1

    e7ce80a16236e7e4b2bfd368f458c97117261b0a

    SHA256

    5ac65aac9135ecb3b310bcbfe8ff6f332e9091dc7ff4c1191688f6ad60d0d84a

    SHA512

    7585df08d9b9ecb49f942a2728f17bbe1d33d2798c3c01613d0d7ea95466c34732afb63049adde8a2590f0672bad2940c8b0e0cbe1c6196b1400513a8da4f3d5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\LK3xq94.exe

    Filesize

    732KB

    MD5

    2548cd0e30f2677ba53186fa823fe50f

    SHA1

    e7ce80a16236e7e4b2bfd368f458c97117261b0a

    SHA256

    5ac65aac9135ecb3b310bcbfe8ff6f332e9091dc7ff4c1191688f6ad60d0d84a

    SHA512

    7585df08d9b9ecb49f942a2728f17bbe1d33d2798c3c01613d0d7ea95466c34732afb63049adde8a2590f0672bad2940c8b0e0cbe1c6196b1400513a8da4f3d5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe

    Filesize

    1.8MB

    MD5

    54d6ada673609443faad54246d0c0c99

    SHA1

    c8b385d71ebf088b46e399c4a6d999d4e9444a99

    SHA256

    ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb

    SHA512

    db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe

    Filesize

    1.8MB

    MD5

    54d6ada673609443faad54246d0c0c99

    SHA1

    c8b385d71ebf088b46e399c4a6d999d4e9444a99

    SHA256

    ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb

    SHA512

    db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe

    Filesize

    1.8MB

    MD5

    54d6ada673609443faad54246d0c0c99

    SHA1

    c8b385d71ebf088b46e399c4a6d999d4e9444a99

    SHA256

    ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb

    SHA512

    db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Da1MZ02.exe

    Filesize

    1.7MB

    MD5

    b237ee777ed80e71fcaac3db3003cc57

    SHA1

    3b3f8be131b830655c6620c46bfeeef91c231e19

    SHA256

    900e1db8b6ba7515204c06a41fb53a3b58b593bdcdd1d5fb70c5136716bd4390

    SHA512

    0cdfc345187fe6c9cecd09d33d01917922527c8d40c52ada13840a6b67cc18bd175fc74ecd9762bec8e47dfbf7e67b49d7105496c299030d0eb42b7163f36f9a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Da1MZ02.exe

    Filesize

    1.7MB

    MD5

    b237ee777ed80e71fcaac3db3003cc57

    SHA1

    3b3f8be131b830655c6620c46bfeeef91c231e19

    SHA256

    900e1db8b6ba7515204c06a41fb53a3b58b593bdcdd1d5fb70c5136716bd4390

    SHA512

    0cdfc345187fe6c9cecd09d33d01917922527c8d40c52ada13840a6b67cc18bd175fc74ecd9762bec8e47dfbf7e67b49d7105496c299030d0eb42b7163f36f9a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\uw0Ic44.exe

    Filesize

    1.2MB

    MD5

    c9ce1186e23400bb11d422517d716bea

    SHA1

    85a6c17373c8094f2bb156f4fc2c158ed3e0ffda

    SHA256

    c197bdf0a605c34d9bc3e966b9095b39247b83aa4c444199476ab837788daca3

    SHA512

    04664aa30b70b6b783d36f8fbc9118f912d6c28df3dafa60a83d95a6aa6b64364f8fbdba23c3a802f71e16195ee6a4fceb5794d600abd9a772da634eebecbdf1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\uw0Ic44.exe

    Filesize

    1.2MB

    MD5

    c9ce1186e23400bb11d422517d716bea

    SHA1

    85a6c17373c8094f2bb156f4fc2c158ed3e0ffda

    SHA256

    c197bdf0a605c34d9bc3e966b9095b39247b83aa4c444199476ab837788daca3

    SHA512

    04664aa30b70b6b783d36f8fbc9118f912d6c28df3dafa60a83d95a6aa6b64364f8fbdba23c3a802f71e16195ee6a4fceb5794d600abd9a772da634eebecbdf1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\LK3xq94.exe

    Filesize

    732KB

    MD5

    2548cd0e30f2677ba53186fa823fe50f

    SHA1

    e7ce80a16236e7e4b2bfd368f458c97117261b0a

    SHA256

    5ac65aac9135ecb3b310bcbfe8ff6f332e9091dc7ff4c1191688f6ad60d0d84a

    SHA512

    7585df08d9b9ecb49f942a2728f17bbe1d33d2798c3c01613d0d7ea95466c34732afb63049adde8a2590f0672bad2940c8b0e0cbe1c6196b1400513a8da4f3d5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\LK3xq94.exe

    Filesize

    732KB

    MD5

    2548cd0e30f2677ba53186fa823fe50f

    SHA1

    e7ce80a16236e7e4b2bfd368f458c97117261b0a

    SHA256

    5ac65aac9135ecb3b310bcbfe8ff6f332e9091dc7ff4c1191688f6ad60d0d84a

    SHA512

    7585df08d9b9ecb49f942a2728f17bbe1d33d2798c3c01613d0d7ea95466c34732afb63049adde8a2590f0672bad2940c8b0e0cbe1c6196b1400513a8da4f3d5

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe

    Filesize

    1.8MB

    MD5

    54d6ada673609443faad54246d0c0c99

    SHA1

    c8b385d71ebf088b46e399c4a6d999d4e9444a99

    SHA256

    ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb

    SHA512

    db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe

    Filesize

    1.8MB

    MD5

    54d6ada673609443faad54246d0c0c99

    SHA1

    c8b385d71ebf088b46e399c4a6d999d4e9444a99

    SHA256

    ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb

    SHA512

    db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe

    Filesize

    1.8MB

    MD5

    54d6ada673609443faad54246d0c0c99

    SHA1

    c8b385d71ebf088b46e399c4a6d999d4e9444a99

    SHA256

    ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb

    SHA512

    db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe

    Filesize

    1.8MB

    MD5

    54d6ada673609443faad54246d0c0c99

    SHA1

    c8b385d71ebf088b46e399c4a6d999d4e9444a99

    SHA256

    ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb

    SHA512

    db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe

    Filesize

    1.8MB

    MD5

    54d6ada673609443faad54246d0c0c99

    SHA1

    c8b385d71ebf088b46e399c4a6d999d4e9444a99

    SHA256

    ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb

    SHA512

    db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe

    Filesize

    1.8MB

    MD5

    54d6ada673609443faad54246d0c0c99

    SHA1

    c8b385d71ebf088b46e399c4a6d999d4e9444a99

    SHA256

    ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb

    SHA512

    db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xn41Yv2.exe

    Filesize

    1.8MB

    MD5

    54d6ada673609443faad54246d0c0c99

    SHA1

    c8b385d71ebf088b46e399c4a6d999d4e9444a99

    SHA256

    ed8f66ae5cd968ea6fcdaeeb568132abd2cbd337cbd9cb58b97b1d91a5337ddb

    SHA512

    db4555a5aa2ae534bd3e09bcda31bf1c7d7bc0cb869968ac5eda09e8bea6dc01d747e568fd5c76ac559c209fd460bd1e60e388cc30dce36bc63a8c06457b8b71

  • memory/2484-49-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2484-60-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-47-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2484-51-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2484-53-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2484-46-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2484-45-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2484-44-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2484-57-0x0000000000300000-0x000000000031E000-memory.dmp

    Filesize

    120KB

  • memory/2484-43-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2484-59-0x0000000000330000-0x000000000034C000-memory.dmp

    Filesize

    112KB

  • memory/2484-61-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-63-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-48-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2484-67-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-65-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-71-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-69-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-75-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-73-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-79-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-77-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-83-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-81-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-87-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB

  • memory/2484-85-0x0000000000330000-0x0000000000346000-memory.dmp

    Filesize

    88KB