Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 13:44

General

  • Target

    6f4367aebf6ac6bba5acbeda0a097331c2d213290f6d487611ecfa393657e5dd.exe

  • Size

    1.8MB

  • MD5

    d5fb73bcbd2b335ad93db5c6dc87bff9

  • SHA1

    7d5ffca40a1a3e1ecc9308c4b21b6a1f0c900e8b

  • SHA256

    6f4367aebf6ac6bba5acbeda0a097331c2d213290f6d487611ecfa393657e5dd

  • SHA512

    02bd909484d4e96912d5baaae0e021f1e618f0faa54e0fc2d6c7b9df583e5550f6349896bfce6dcd791df24db316d1b33f4e2eeca5e11e4acb7374df43567bb3

  • SSDEEP

    24576:/ySzwq4WimIs7/h8cxzQvRaRCAxJOGuhiV70vRJqOf++/4wegOy/cKJh4xhbqKuS:K8wqIVKGvRaRPOeQvRvRxegOoJhi/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f4367aebf6ac6bba5acbeda0a097331c2d213290f6d487611ecfa393657e5dd.exe
    "C:\Users\Admin\AppData\Local\Temp\6f4367aebf6ac6bba5acbeda0a097331c2d213290f6d487611ecfa393657e5dd.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fh7On53.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fh7On53.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pY6ew66.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pY6ew66.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Gt9EA18.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Gt9EA18.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2120
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fh7On53.exe

    Filesize

    1.7MB

    MD5

    95ecebe2dc8bc691c76a3f668ddf8266

    SHA1

    70b2fa079a0b4059c32528ad5a8b3177e468471a

    SHA256

    30742082f20253f219fc6b36d059ab220376b1c6a56e83b254661e5f0408a8bc

    SHA512

    1adfb82db1340a4ffc48318eb28b862b40b3987d3a5a2e10ea8840c6a6a8e8eb27a92db5a712b0965528d41ec114abdc8d10857965439bf6f20f0b02b3e41604

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fh7On53.exe

    Filesize

    1.7MB

    MD5

    95ecebe2dc8bc691c76a3f668ddf8266

    SHA1

    70b2fa079a0b4059c32528ad5a8b3177e468471a

    SHA256

    30742082f20253f219fc6b36d059ab220376b1c6a56e83b254661e5f0408a8bc

    SHA512

    1adfb82db1340a4ffc48318eb28b862b40b3987d3a5a2e10ea8840c6a6a8e8eb27a92db5a712b0965528d41ec114abdc8d10857965439bf6f20f0b02b3e41604

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pY6ew66.exe

    Filesize

    1.2MB

    MD5

    60ae849d0ac940bb2b22e3e6f0ef3ad6

    SHA1

    3f85d0a3a08aaadbcad009f6fa0443cceeb581e0

    SHA256

    e259632daf998bd454d0fb2f3ed28a1c712a9fa9d7985ff11f7d9b078365179d

    SHA512

    83acb8d43a1db6200699e0ad98b758d3e1aaa81bb0686aa30b21c12394a6a7cd563c7a022a68261e5b88c4537dbb7f547a117d7e7e0828a564748b63cb1625b5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pY6ew66.exe

    Filesize

    1.2MB

    MD5

    60ae849d0ac940bb2b22e3e6f0ef3ad6

    SHA1

    3f85d0a3a08aaadbcad009f6fa0443cceeb581e0

    SHA256

    e259632daf998bd454d0fb2f3ed28a1c712a9fa9d7985ff11f7d9b078365179d

    SHA512

    83acb8d43a1db6200699e0ad98b758d3e1aaa81bb0686aa30b21c12394a6a7cd563c7a022a68261e5b88c4537dbb7f547a117d7e7e0828a564748b63cb1625b5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Gt9EA18.exe

    Filesize

    731KB

    MD5

    02ca53aac86ef3212e35c75bb9d31332

    SHA1

    8dd67730c3c4f6e888f86eafc0bfccb2c1ff0b92

    SHA256

    088710157df3c9333a40c4baba5fe521af49633c3a5c0d99b8ac3e4c08fcb3ce

    SHA512

    73363c715462fa180861bd27d5cd59a6b60638dbd474ad8d193d468d6d306144afa4f481d1892a10e78fc2443fce54150c162cf03cbb4dda47cb4e9a2176e907

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Gt9EA18.exe

    Filesize

    731KB

    MD5

    02ca53aac86ef3212e35c75bb9d31332

    SHA1

    8dd67730c3c4f6e888f86eafc0bfccb2c1ff0b92

    SHA256

    088710157df3c9333a40c4baba5fe521af49633c3a5c0d99b8ac3e4c08fcb3ce

    SHA512

    73363c715462fa180861bd27d5cd59a6b60638dbd474ad8d193d468d6d306144afa4f481d1892a10e78fc2443fce54150c162cf03cbb4dda47cb4e9a2176e907

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe

    Filesize

    1.8MB

    MD5

    bb7b295928435fe682664b063e35da08

    SHA1

    ffcb73703682d1c577b07be2b93fdb63938d9a3b

    SHA256

    95a72227ccba3a44fc55486ec8f79eeef7981b76c73e9ff9dd7ca88741833e2a

    SHA512

    87a3403240b8c2a0e3a917049a1c8d6ab1f022f99f1f8c24c6004d7f069db9d3c7902870adf41fcb8446f14aadf853cdce9460519c4ab72801890dc20c78cb28

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe

    Filesize

    1.8MB

    MD5

    bb7b295928435fe682664b063e35da08

    SHA1

    ffcb73703682d1c577b07be2b93fdb63938d9a3b

    SHA256

    95a72227ccba3a44fc55486ec8f79eeef7981b76c73e9ff9dd7ca88741833e2a

    SHA512

    87a3403240b8c2a0e3a917049a1c8d6ab1f022f99f1f8c24c6004d7f069db9d3c7902870adf41fcb8446f14aadf853cdce9460519c4ab72801890dc20c78cb28

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe

    Filesize

    1.8MB

    MD5

    bb7b295928435fe682664b063e35da08

    SHA1

    ffcb73703682d1c577b07be2b93fdb63938d9a3b

    SHA256

    95a72227ccba3a44fc55486ec8f79eeef7981b76c73e9ff9dd7ca88741833e2a

    SHA512

    87a3403240b8c2a0e3a917049a1c8d6ab1f022f99f1f8c24c6004d7f069db9d3c7902870adf41fcb8446f14aadf853cdce9460519c4ab72801890dc20c78cb28

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fh7On53.exe

    Filesize

    1.7MB

    MD5

    95ecebe2dc8bc691c76a3f668ddf8266

    SHA1

    70b2fa079a0b4059c32528ad5a8b3177e468471a

    SHA256

    30742082f20253f219fc6b36d059ab220376b1c6a56e83b254661e5f0408a8bc

    SHA512

    1adfb82db1340a4ffc48318eb28b862b40b3987d3a5a2e10ea8840c6a6a8e8eb27a92db5a712b0965528d41ec114abdc8d10857965439bf6f20f0b02b3e41604

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fh7On53.exe

    Filesize

    1.7MB

    MD5

    95ecebe2dc8bc691c76a3f668ddf8266

    SHA1

    70b2fa079a0b4059c32528ad5a8b3177e468471a

    SHA256

    30742082f20253f219fc6b36d059ab220376b1c6a56e83b254661e5f0408a8bc

    SHA512

    1adfb82db1340a4ffc48318eb28b862b40b3987d3a5a2e10ea8840c6a6a8e8eb27a92db5a712b0965528d41ec114abdc8d10857965439bf6f20f0b02b3e41604

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pY6ew66.exe

    Filesize

    1.2MB

    MD5

    60ae849d0ac940bb2b22e3e6f0ef3ad6

    SHA1

    3f85d0a3a08aaadbcad009f6fa0443cceeb581e0

    SHA256

    e259632daf998bd454d0fb2f3ed28a1c712a9fa9d7985ff11f7d9b078365179d

    SHA512

    83acb8d43a1db6200699e0ad98b758d3e1aaa81bb0686aa30b21c12394a6a7cd563c7a022a68261e5b88c4537dbb7f547a117d7e7e0828a564748b63cb1625b5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pY6ew66.exe

    Filesize

    1.2MB

    MD5

    60ae849d0ac940bb2b22e3e6f0ef3ad6

    SHA1

    3f85d0a3a08aaadbcad009f6fa0443cceeb581e0

    SHA256

    e259632daf998bd454d0fb2f3ed28a1c712a9fa9d7985ff11f7d9b078365179d

    SHA512

    83acb8d43a1db6200699e0ad98b758d3e1aaa81bb0686aa30b21c12394a6a7cd563c7a022a68261e5b88c4537dbb7f547a117d7e7e0828a564748b63cb1625b5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Gt9EA18.exe

    Filesize

    731KB

    MD5

    02ca53aac86ef3212e35c75bb9d31332

    SHA1

    8dd67730c3c4f6e888f86eafc0bfccb2c1ff0b92

    SHA256

    088710157df3c9333a40c4baba5fe521af49633c3a5c0d99b8ac3e4c08fcb3ce

    SHA512

    73363c715462fa180861bd27d5cd59a6b60638dbd474ad8d193d468d6d306144afa4f481d1892a10e78fc2443fce54150c162cf03cbb4dda47cb4e9a2176e907

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Gt9EA18.exe

    Filesize

    731KB

    MD5

    02ca53aac86ef3212e35c75bb9d31332

    SHA1

    8dd67730c3c4f6e888f86eafc0bfccb2c1ff0b92

    SHA256

    088710157df3c9333a40c4baba5fe521af49633c3a5c0d99b8ac3e4c08fcb3ce

    SHA512

    73363c715462fa180861bd27d5cd59a6b60638dbd474ad8d193d468d6d306144afa4f481d1892a10e78fc2443fce54150c162cf03cbb4dda47cb4e9a2176e907

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe

    Filesize

    1.8MB

    MD5

    bb7b295928435fe682664b063e35da08

    SHA1

    ffcb73703682d1c577b07be2b93fdb63938d9a3b

    SHA256

    95a72227ccba3a44fc55486ec8f79eeef7981b76c73e9ff9dd7ca88741833e2a

    SHA512

    87a3403240b8c2a0e3a917049a1c8d6ab1f022f99f1f8c24c6004d7f069db9d3c7902870adf41fcb8446f14aadf853cdce9460519c4ab72801890dc20c78cb28

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe

    Filesize

    1.8MB

    MD5

    bb7b295928435fe682664b063e35da08

    SHA1

    ffcb73703682d1c577b07be2b93fdb63938d9a3b

    SHA256

    95a72227ccba3a44fc55486ec8f79eeef7981b76c73e9ff9dd7ca88741833e2a

    SHA512

    87a3403240b8c2a0e3a917049a1c8d6ab1f022f99f1f8c24c6004d7f069db9d3c7902870adf41fcb8446f14aadf853cdce9460519c4ab72801890dc20c78cb28

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe

    Filesize

    1.8MB

    MD5

    bb7b295928435fe682664b063e35da08

    SHA1

    ffcb73703682d1c577b07be2b93fdb63938d9a3b

    SHA256

    95a72227ccba3a44fc55486ec8f79eeef7981b76c73e9ff9dd7ca88741833e2a

    SHA512

    87a3403240b8c2a0e3a917049a1c8d6ab1f022f99f1f8c24c6004d7f069db9d3c7902870adf41fcb8446f14aadf853cdce9460519c4ab72801890dc20c78cb28

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe

    Filesize

    1.8MB

    MD5

    bb7b295928435fe682664b063e35da08

    SHA1

    ffcb73703682d1c577b07be2b93fdb63938d9a3b

    SHA256

    95a72227ccba3a44fc55486ec8f79eeef7981b76c73e9ff9dd7ca88741833e2a

    SHA512

    87a3403240b8c2a0e3a917049a1c8d6ab1f022f99f1f8c24c6004d7f069db9d3c7902870adf41fcb8446f14aadf853cdce9460519c4ab72801890dc20c78cb28

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe

    Filesize

    1.8MB

    MD5

    bb7b295928435fe682664b063e35da08

    SHA1

    ffcb73703682d1c577b07be2b93fdb63938d9a3b

    SHA256

    95a72227ccba3a44fc55486ec8f79eeef7981b76c73e9ff9dd7ca88741833e2a

    SHA512

    87a3403240b8c2a0e3a917049a1c8d6ab1f022f99f1f8c24c6004d7f069db9d3c7902870adf41fcb8446f14aadf853cdce9460519c4ab72801890dc20c78cb28

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe

    Filesize

    1.8MB

    MD5

    bb7b295928435fe682664b063e35da08

    SHA1

    ffcb73703682d1c577b07be2b93fdb63938d9a3b

    SHA256

    95a72227ccba3a44fc55486ec8f79eeef7981b76c73e9ff9dd7ca88741833e2a

    SHA512

    87a3403240b8c2a0e3a917049a1c8d6ab1f022f99f1f8c24c6004d7f069db9d3c7902870adf41fcb8446f14aadf853cdce9460519c4ab72801890dc20c78cb28

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hf59iC2.exe

    Filesize

    1.8MB

    MD5

    bb7b295928435fe682664b063e35da08

    SHA1

    ffcb73703682d1c577b07be2b93fdb63938d9a3b

    SHA256

    95a72227ccba3a44fc55486ec8f79eeef7981b76c73e9ff9dd7ca88741833e2a

    SHA512

    87a3403240b8c2a0e3a917049a1c8d6ab1f022f99f1f8c24c6004d7f069db9d3c7902870adf41fcb8446f14aadf853cdce9460519c4ab72801890dc20c78cb28

  • memory/2120-49-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2120-71-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-47-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2120-51-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2120-53-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2120-46-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2120-45-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2120-44-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2120-43-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2120-58-0x0000000000370000-0x000000000038E000-memory.dmp

    Filesize

    120KB

  • memory/2120-59-0x00000000003B0000-0x00000000003CC000-memory.dmp

    Filesize

    112KB

  • memory/2120-60-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-65-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-48-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2120-77-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-83-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-87-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-85-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-81-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-79-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-75-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-73-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-69-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-67-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-63-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2120-61-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB