Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 12:00

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    a574e6c13c43e0706ce1e2d90b92dc33

  • SHA1

    91eb6f0f19b040f9520e5d6cbd98b659e6e01eaa

  • SHA256

    0d2075b728700bacfa79dc4138df8e89a8d3a67221f612d2997968598b6285b3

  • SHA512

    9270458ff34c751787e02bac5e401c03acab85cfcef139652ea0c5642b69c7fc052c09209665d3cfd2efe538c564bf916d1a6b5927229140a54889f125b69684

  • SSDEEP

    24576:vyyAg7xpQbRy8/VEJG91Bihk4nCkcv8hMG:6vIx5wVEo91Bihkjv8h

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2624
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2380
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:1872
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                    PID:1344
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    6⤵
                      PID:2500
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 268
                        7⤵
                        • Program crash
                        PID:2984
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 308
                      6⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:3012

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe

            Filesize

            1.0MB

            MD5

            7957e2813e61bb5b89bec894f250dcc9

            SHA1

            91f4770ed3472d6cbee703ef6f82f477983532dd

            SHA256

            8b668df98dd3aadafcef98851fc7abd70af7c49cf898e4966aa43ab8253ae405

            SHA512

            392e720a4eec76d48868f1d926578b1d2d61315c26f3aadfee9fb8e80f78a7486e8dc606b61b02b498b4469aea820d0ad53e45b3845cec2f8c310cd387ae7086

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe

            Filesize

            1.0MB

            MD5

            7957e2813e61bb5b89bec894f250dcc9

            SHA1

            91f4770ed3472d6cbee703ef6f82f477983532dd

            SHA256

            8b668df98dd3aadafcef98851fc7abd70af7c49cf898e4966aa43ab8253ae405

            SHA512

            392e720a4eec76d48868f1d926578b1d2d61315c26f3aadfee9fb8e80f78a7486e8dc606b61b02b498b4469aea820d0ad53e45b3845cec2f8c310cd387ae7086

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe

            Filesize

            746KB

            MD5

            c5e9508b8f64ab74dd6ea2db6a135536

            SHA1

            ca7c145d4c7ae2210c7398256fd31a0ded6991e0

            SHA256

            7bdc4b15f9a239a22f2fa70eee48d703efe631e40eb2eb96b3ccc997f0571dc6

            SHA512

            24c69e7ed39ee09a2e373756c1c17f13c1a7b2e8ad6304961d4dd4dbec7562ed636daa9c2bcb1d0495f0756e89aca0f9afdc61adc9b4860aa000972e3d1ab794

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe

            Filesize

            746KB

            MD5

            c5e9508b8f64ab74dd6ea2db6a135536

            SHA1

            ca7c145d4c7ae2210c7398256fd31a0ded6991e0

            SHA256

            7bdc4b15f9a239a22f2fa70eee48d703efe631e40eb2eb96b3ccc997f0571dc6

            SHA512

            24c69e7ed39ee09a2e373756c1c17f13c1a7b2e8ad6304961d4dd4dbec7562ed636daa9c2bcb1d0495f0756e89aca0f9afdc61adc9b4860aa000972e3d1ab794

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe

            Filesize

            493KB

            MD5

            949607a3ad67704d804b220ba5e8caf5

            SHA1

            8fd7b8d49f9be51913cae602e62357525eb014b7

            SHA256

            3ba34f1f42ba35063281f4ffaa736b514936efbeec8902b8f6a5ea4601a3a26a

            SHA512

            b5de8594d2a1fbfd7bf760dd60daa84fdcb5d886ef3e67fb51f6f1b5e490266d01b42c43796ceac466b5c029a89bd1519668e860cffa48bd2765121fc956934c

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe

            Filesize

            493KB

            MD5

            949607a3ad67704d804b220ba5e8caf5

            SHA1

            8fd7b8d49f9be51913cae602e62357525eb014b7

            SHA256

            3ba34f1f42ba35063281f4ffaa736b514936efbeec8902b8f6a5ea4601a3a26a

            SHA512

            b5de8594d2a1fbfd7bf760dd60daa84fdcb5d886ef3e67fb51f6f1b5e490266d01b42c43796ceac466b5c029a89bd1519668e860cffa48bd2765121fc956934c

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe

            Filesize

            194KB

            MD5

            6241b03d68a610324ecda52f0f84e287

            SHA1

            da80280b6e3925e455925efd6c6e59a6118269c4

            SHA256

            ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

            SHA512

            a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe

            Filesize

            194KB

            MD5

            6241b03d68a610324ecda52f0f84e287

            SHA1

            da80280b6e3925e455925efd6c6e59a6118269c4

            SHA256

            ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

            SHA512

            a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

            Filesize

            447KB

            MD5

            a26557fa4a7e113d215a5103b07343bf

            SHA1

            3c1bbefd24caaf4b77715ca8583829c3ac797d1c

            SHA256

            b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

            SHA512

            ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

            Filesize

            447KB

            MD5

            a26557fa4a7e113d215a5103b07343bf

            SHA1

            3c1bbefd24caaf4b77715ca8583829c3ac797d1c

            SHA256

            b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

            SHA512

            ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe

            Filesize

            1.0MB

            MD5

            7957e2813e61bb5b89bec894f250dcc9

            SHA1

            91f4770ed3472d6cbee703ef6f82f477983532dd

            SHA256

            8b668df98dd3aadafcef98851fc7abd70af7c49cf898e4966aa43ab8253ae405

            SHA512

            392e720a4eec76d48868f1d926578b1d2d61315c26f3aadfee9fb8e80f78a7486e8dc606b61b02b498b4469aea820d0ad53e45b3845cec2f8c310cd387ae7086

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe

            Filesize

            1.0MB

            MD5

            7957e2813e61bb5b89bec894f250dcc9

            SHA1

            91f4770ed3472d6cbee703ef6f82f477983532dd

            SHA256

            8b668df98dd3aadafcef98851fc7abd70af7c49cf898e4966aa43ab8253ae405

            SHA512

            392e720a4eec76d48868f1d926578b1d2d61315c26f3aadfee9fb8e80f78a7486e8dc606b61b02b498b4469aea820d0ad53e45b3845cec2f8c310cd387ae7086

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe

            Filesize

            746KB

            MD5

            c5e9508b8f64ab74dd6ea2db6a135536

            SHA1

            ca7c145d4c7ae2210c7398256fd31a0ded6991e0

            SHA256

            7bdc4b15f9a239a22f2fa70eee48d703efe631e40eb2eb96b3ccc997f0571dc6

            SHA512

            24c69e7ed39ee09a2e373756c1c17f13c1a7b2e8ad6304961d4dd4dbec7562ed636daa9c2bcb1d0495f0756e89aca0f9afdc61adc9b4860aa000972e3d1ab794

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe

            Filesize

            746KB

            MD5

            c5e9508b8f64ab74dd6ea2db6a135536

            SHA1

            ca7c145d4c7ae2210c7398256fd31a0ded6991e0

            SHA256

            7bdc4b15f9a239a22f2fa70eee48d703efe631e40eb2eb96b3ccc997f0571dc6

            SHA512

            24c69e7ed39ee09a2e373756c1c17f13c1a7b2e8ad6304961d4dd4dbec7562ed636daa9c2bcb1d0495f0756e89aca0f9afdc61adc9b4860aa000972e3d1ab794

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe

            Filesize

            493KB

            MD5

            949607a3ad67704d804b220ba5e8caf5

            SHA1

            8fd7b8d49f9be51913cae602e62357525eb014b7

            SHA256

            3ba34f1f42ba35063281f4ffaa736b514936efbeec8902b8f6a5ea4601a3a26a

            SHA512

            b5de8594d2a1fbfd7bf760dd60daa84fdcb5d886ef3e67fb51f6f1b5e490266d01b42c43796ceac466b5c029a89bd1519668e860cffa48bd2765121fc956934c

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe

            Filesize

            493KB

            MD5

            949607a3ad67704d804b220ba5e8caf5

            SHA1

            8fd7b8d49f9be51913cae602e62357525eb014b7

            SHA256

            3ba34f1f42ba35063281f4ffaa736b514936efbeec8902b8f6a5ea4601a3a26a

            SHA512

            b5de8594d2a1fbfd7bf760dd60daa84fdcb5d886ef3e67fb51f6f1b5e490266d01b42c43796ceac466b5c029a89bd1519668e860cffa48bd2765121fc956934c

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe

            Filesize

            194KB

            MD5

            6241b03d68a610324ecda52f0f84e287

            SHA1

            da80280b6e3925e455925efd6c6e59a6118269c4

            SHA256

            ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

            SHA512

            a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe

            Filesize

            194KB

            MD5

            6241b03d68a610324ecda52f0f84e287

            SHA1

            da80280b6e3925e455925efd6c6e59a6118269c4

            SHA256

            ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

            SHA512

            a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

            Filesize

            447KB

            MD5

            a26557fa4a7e113d215a5103b07343bf

            SHA1

            3c1bbefd24caaf4b77715ca8583829c3ac797d1c

            SHA256

            b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

            SHA512

            ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

            Filesize

            447KB

            MD5

            a26557fa4a7e113d215a5103b07343bf

            SHA1

            3c1bbefd24caaf4b77715ca8583829c3ac797d1c

            SHA256

            b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

            SHA512

            ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

            Filesize

            447KB

            MD5

            a26557fa4a7e113d215a5103b07343bf

            SHA1

            3c1bbefd24caaf4b77715ca8583829c3ac797d1c

            SHA256

            b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

            SHA512

            ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

            Filesize

            447KB

            MD5

            a26557fa4a7e113d215a5103b07343bf

            SHA1

            3c1bbefd24caaf4b77715ca8583829c3ac797d1c

            SHA256

            b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

            SHA512

            ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

            Filesize

            447KB

            MD5

            a26557fa4a7e113d215a5103b07343bf

            SHA1

            3c1bbefd24caaf4b77715ca8583829c3ac797d1c

            SHA256

            b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

            SHA512

            ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

            Filesize

            447KB

            MD5

            a26557fa4a7e113d215a5103b07343bf

            SHA1

            3c1bbefd24caaf4b77715ca8583829c3ac797d1c

            SHA256

            b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

            SHA512

            ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

          • memory/2500-83-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2500-87-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2500-76-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2500-85-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2500-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2500-81-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2500-80-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2500-79-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2500-78-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2500-77-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2624-65-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-63-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-40-0x00000000003E0000-0x00000000003FE000-memory.dmp

            Filesize

            120KB

          • memory/2624-42-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-43-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-51-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-55-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-57-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-59-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-41-0x0000000000AE0000-0x0000000000AFC000-memory.dmp

            Filesize

            112KB

          • memory/2624-45-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-69-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-67-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-61-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-53-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-49-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB

          • memory/2624-47-0x0000000000AE0000-0x0000000000AF6000-memory.dmp

            Filesize

            88KB