Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 12:00

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    a574e6c13c43e0706ce1e2d90b92dc33

  • SHA1

    91eb6f0f19b040f9520e5d6cbd98b659e6e01eaa

  • SHA256

    0d2075b728700bacfa79dc4138df8e89a8d3a67221f612d2997968598b6285b3

  • SHA512

    9270458ff34c751787e02bac5e401c03acab85cfcef139652ea0c5642b69c7fc052c09209665d3cfd2efe538c564bf916d1a6b5927229140a54889f125b69684

  • SSDEEP

    24576:vyyAg7xpQbRy8/VEJG91Bihk4nCkcv8hMG:6vIx5wVEo91Bihkjv8h

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2344
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2900
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2444
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:676
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:568
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 268
                    7⤵
                    • Program crash
                    PID:1504
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 300
                  6⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:584

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe

        Filesize

        1.0MB

        MD5

        7957e2813e61bb5b89bec894f250dcc9

        SHA1

        91f4770ed3472d6cbee703ef6f82f477983532dd

        SHA256

        8b668df98dd3aadafcef98851fc7abd70af7c49cf898e4966aa43ab8253ae405

        SHA512

        392e720a4eec76d48868f1d926578b1d2d61315c26f3aadfee9fb8e80f78a7486e8dc606b61b02b498b4469aea820d0ad53e45b3845cec2f8c310cd387ae7086

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe

        Filesize

        1.0MB

        MD5

        7957e2813e61bb5b89bec894f250dcc9

        SHA1

        91f4770ed3472d6cbee703ef6f82f477983532dd

        SHA256

        8b668df98dd3aadafcef98851fc7abd70af7c49cf898e4966aa43ab8253ae405

        SHA512

        392e720a4eec76d48868f1d926578b1d2d61315c26f3aadfee9fb8e80f78a7486e8dc606b61b02b498b4469aea820d0ad53e45b3845cec2f8c310cd387ae7086

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe

        Filesize

        746KB

        MD5

        c5e9508b8f64ab74dd6ea2db6a135536

        SHA1

        ca7c145d4c7ae2210c7398256fd31a0ded6991e0

        SHA256

        7bdc4b15f9a239a22f2fa70eee48d703efe631e40eb2eb96b3ccc997f0571dc6

        SHA512

        24c69e7ed39ee09a2e373756c1c17f13c1a7b2e8ad6304961d4dd4dbec7562ed636daa9c2bcb1d0495f0756e89aca0f9afdc61adc9b4860aa000972e3d1ab794

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe

        Filesize

        746KB

        MD5

        c5e9508b8f64ab74dd6ea2db6a135536

        SHA1

        ca7c145d4c7ae2210c7398256fd31a0ded6991e0

        SHA256

        7bdc4b15f9a239a22f2fa70eee48d703efe631e40eb2eb96b3ccc997f0571dc6

        SHA512

        24c69e7ed39ee09a2e373756c1c17f13c1a7b2e8ad6304961d4dd4dbec7562ed636daa9c2bcb1d0495f0756e89aca0f9afdc61adc9b4860aa000972e3d1ab794

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe

        Filesize

        493KB

        MD5

        949607a3ad67704d804b220ba5e8caf5

        SHA1

        8fd7b8d49f9be51913cae602e62357525eb014b7

        SHA256

        3ba34f1f42ba35063281f4ffaa736b514936efbeec8902b8f6a5ea4601a3a26a

        SHA512

        b5de8594d2a1fbfd7bf760dd60daa84fdcb5d886ef3e67fb51f6f1b5e490266d01b42c43796ceac466b5c029a89bd1519668e860cffa48bd2765121fc956934c

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe

        Filesize

        493KB

        MD5

        949607a3ad67704d804b220ba5e8caf5

        SHA1

        8fd7b8d49f9be51913cae602e62357525eb014b7

        SHA256

        3ba34f1f42ba35063281f4ffaa736b514936efbeec8902b8f6a5ea4601a3a26a

        SHA512

        b5de8594d2a1fbfd7bf760dd60daa84fdcb5d886ef3e67fb51f6f1b5e490266d01b42c43796ceac466b5c029a89bd1519668e860cffa48bd2765121fc956934c

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe

        Filesize

        194KB

        MD5

        6241b03d68a610324ecda52f0f84e287

        SHA1

        da80280b6e3925e455925efd6c6e59a6118269c4

        SHA256

        ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

        SHA512

        a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe

        Filesize

        194KB

        MD5

        6241b03d68a610324ecda52f0f84e287

        SHA1

        da80280b6e3925e455925efd6c6e59a6118269c4

        SHA256

        ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

        SHA512

        a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

        Filesize

        447KB

        MD5

        a26557fa4a7e113d215a5103b07343bf

        SHA1

        3c1bbefd24caaf4b77715ca8583829c3ac797d1c

        SHA256

        b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

        SHA512

        ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

        Filesize

        447KB

        MD5

        a26557fa4a7e113d215a5103b07343bf

        SHA1

        3c1bbefd24caaf4b77715ca8583829c3ac797d1c

        SHA256

        b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

        SHA512

        ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe

        Filesize

        1.0MB

        MD5

        7957e2813e61bb5b89bec894f250dcc9

        SHA1

        91f4770ed3472d6cbee703ef6f82f477983532dd

        SHA256

        8b668df98dd3aadafcef98851fc7abd70af7c49cf898e4966aa43ab8253ae405

        SHA512

        392e720a4eec76d48868f1d926578b1d2d61315c26f3aadfee9fb8e80f78a7486e8dc606b61b02b498b4469aea820d0ad53e45b3845cec2f8c310cd387ae7086

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\NE6ss01.exe

        Filesize

        1.0MB

        MD5

        7957e2813e61bb5b89bec894f250dcc9

        SHA1

        91f4770ed3472d6cbee703ef6f82f477983532dd

        SHA256

        8b668df98dd3aadafcef98851fc7abd70af7c49cf898e4966aa43ab8253ae405

        SHA512

        392e720a4eec76d48868f1d926578b1d2d61315c26f3aadfee9fb8e80f78a7486e8dc606b61b02b498b4469aea820d0ad53e45b3845cec2f8c310cd387ae7086

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe

        Filesize

        746KB

        MD5

        c5e9508b8f64ab74dd6ea2db6a135536

        SHA1

        ca7c145d4c7ae2210c7398256fd31a0ded6991e0

        SHA256

        7bdc4b15f9a239a22f2fa70eee48d703efe631e40eb2eb96b3ccc997f0571dc6

        SHA512

        24c69e7ed39ee09a2e373756c1c17f13c1a7b2e8ad6304961d4dd4dbec7562ed636daa9c2bcb1d0495f0756e89aca0f9afdc61adc9b4860aa000972e3d1ab794

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tH2Rp74.exe

        Filesize

        746KB

        MD5

        c5e9508b8f64ab74dd6ea2db6a135536

        SHA1

        ca7c145d4c7ae2210c7398256fd31a0ded6991e0

        SHA256

        7bdc4b15f9a239a22f2fa70eee48d703efe631e40eb2eb96b3ccc997f0571dc6

        SHA512

        24c69e7ed39ee09a2e373756c1c17f13c1a7b2e8ad6304961d4dd4dbec7562ed636daa9c2bcb1d0495f0756e89aca0f9afdc61adc9b4860aa000972e3d1ab794

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe

        Filesize

        493KB

        MD5

        949607a3ad67704d804b220ba5e8caf5

        SHA1

        8fd7b8d49f9be51913cae602e62357525eb014b7

        SHA256

        3ba34f1f42ba35063281f4ffaa736b514936efbeec8902b8f6a5ea4601a3a26a

        SHA512

        b5de8594d2a1fbfd7bf760dd60daa84fdcb5d886ef3e67fb51f6f1b5e490266d01b42c43796ceac466b5c029a89bd1519668e860cffa48bd2765121fc956934c

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\nE1HI93.exe

        Filesize

        493KB

        MD5

        949607a3ad67704d804b220ba5e8caf5

        SHA1

        8fd7b8d49f9be51913cae602e62357525eb014b7

        SHA256

        3ba34f1f42ba35063281f4ffaa736b514936efbeec8902b8f6a5ea4601a3a26a

        SHA512

        b5de8594d2a1fbfd7bf760dd60daa84fdcb5d886ef3e67fb51f6f1b5e490266d01b42c43796ceac466b5c029a89bd1519668e860cffa48bd2765121fc956934c

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe

        Filesize

        194KB

        MD5

        6241b03d68a610324ecda52f0f84e287

        SHA1

        da80280b6e3925e455925efd6c6e59a6118269c4

        SHA256

        ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

        SHA512

        a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qt98Ct1.exe

        Filesize

        194KB

        MD5

        6241b03d68a610324ecda52f0f84e287

        SHA1

        da80280b6e3925e455925efd6c6e59a6118269c4

        SHA256

        ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

        SHA512

        a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

        Filesize

        447KB

        MD5

        a26557fa4a7e113d215a5103b07343bf

        SHA1

        3c1bbefd24caaf4b77715ca8583829c3ac797d1c

        SHA256

        b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

        SHA512

        ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

        Filesize

        447KB

        MD5

        a26557fa4a7e113d215a5103b07343bf

        SHA1

        3c1bbefd24caaf4b77715ca8583829c3ac797d1c

        SHA256

        b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

        SHA512

        ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

        Filesize

        447KB

        MD5

        a26557fa4a7e113d215a5103b07343bf

        SHA1

        3c1bbefd24caaf4b77715ca8583829c3ac797d1c

        SHA256

        b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

        SHA512

        ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

        Filesize

        447KB

        MD5

        a26557fa4a7e113d215a5103b07343bf

        SHA1

        3c1bbefd24caaf4b77715ca8583829c3ac797d1c

        SHA256

        b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

        SHA512

        ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

        Filesize

        447KB

        MD5

        a26557fa4a7e113d215a5103b07343bf

        SHA1

        3c1bbefd24caaf4b77715ca8583829c3ac797d1c

        SHA256

        b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

        SHA512

        ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2HT1500.exe

        Filesize

        447KB

        MD5

        a26557fa4a7e113d215a5103b07343bf

        SHA1

        3c1bbefd24caaf4b77715ca8583829c3ac797d1c

        SHA256

        b5aab4febec4564a1fbac4ef1b7c4d3fbb4b3a0c332e6602e7b345bc74a201c6

        SHA512

        ab30ffe2d3d01a2b5f948189b6f68136f8f3dcb095e0571e0820c8176eb786823823fa0299ad32da36e06f5c7ad0b3859e1e07639d83fa097d680614105fcc17

      • memory/568-85-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/568-87-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/568-76-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/568-83-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/568-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/568-80-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/568-81-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/568-79-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/568-77-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/568-78-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2344-59-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-61-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-40-0x00000000003D0000-0x00000000003EE000-memory.dmp

        Filesize

        120KB

      • memory/2344-42-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-43-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-69-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-65-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-67-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-63-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-41-0x00000000005E0000-0x00000000005FC000-memory.dmp

        Filesize

        112KB

      • memory/2344-45-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-55-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-57-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-51-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-53-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-49-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB

      • memory/2344-47-0x00000000005E0000-0x00000000005F6000-memory.dmp

        Filesize

        88KB