Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 12:57

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    4adbdc5ab9b559c61542eb61093519a0

  • SHA1

    e946f1f5573321e1d35db4c9a3585f8134a62530

  • SHA256

    7fa5a039bd29d1a6e1e09a53a7b02a69e5de358d2c8c1b626dcc58500a44d078

  • SHA512

    80aa016ded8b7b179f910aabbf2f8959f8aafeffdedd579fd573dea4217f4f72f1eb76c54c219d742c8dd33a4fd59ce12b23bce49987c817d060c04f6d23cfc8

  • SSDEEP

    24576:uy/LQAsCsZr/yMZbnGUhz3kVtP87b9hE+xnWQto9u2qaT:9/s9CImM9GIjkVthYL

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fF3ki63.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fF3ki63.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BO1Qe19.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BO1Qe19.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\FL5um74.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\FL5um74.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1vs87If6.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1vs87If6.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2756
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Dq4666.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Dq4666.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2624
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2560
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2584
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 292
                  6⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:3060

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fF3ki63.exe

        Filesize

        1.0MB

        MD5

        89187d1ca26efd64d1cf951f936ce404

        SHA1

        49d4e92028a786c57830c9ffa37cfc8ef943282e

        SHA256

        50c727a43c16fee26d81e253532d5d7b64b26d2fefd71876b87a2bc0c7d5534b

        SHA512

        b9a5e92adaf1bc0d3dcbca020a46e35ac3528c15cb668e3f5d0a0132ee084fa1b4dcdced2a2d13356b75a52d51c56188b0a2836201051cb3714d77ac499389f3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fF3ki63.exe

        Filesize

        1.0MB

        MD5

        89187d1ca26efd64d1cf951f936ce404

        SHA1

        49d4e92028a786c57830c9ffa37cfc8ef943282e

        SHA256

        50c727a43c16fee26d81e253532d5d7b64b26d2fefd71876b87a2bc0c7d5534b

        SHA512

        b9a5e92adaf1bc0d3dcbca020a46e35ac3528c15cb668e3f5d0a0132ee084fa1b4dcdced2a2d13356b75a52d51c56188b0a2836201051cb3714d77ac499389f3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BO1Qe19.exe

        Filesize

        746KB

        MD5

        87a96df93b25dd7dcbe09ba70b44a4ff

        SHA1

        80ec7cc634b84707fe1381d81a655a5c63ba3a15

        SHA256

        676e266cfcd532a59cf15a3fc5b8d6aec669f14d0f609c5842733fca913389ff

        SHA512

        b6d676f8b1285aefc1e137419e434d6e1d429f9cd123f9e7c15b89f3bfc84dfec36d6bfd9b45740a4ebee813a3775f0342eb89dfc00853a1c0b3412e53d68a99

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BO1Qe19.exe

        Filesize

        746KB

        MD5

        87a96df93b25dd7dcbe09ba70b44a4ff

        SHA1

        80ec7cc634b84707fe1381d81a655a5c63ba3a15

        SHA256

        676e266cfcd532a59cf15a3fc5b8d6aec669f14d0f609c5842733fca913389ff

        SHA512

        b6d676f8b1285aefc1e137419e434d6e1d429f9cd123f9e7c15b89f3bfc84dfec36d6bfd9b45740a4ebee813a3775f0342eb89dfc00853a1c0b3412e53d68a99

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\FL5um74.exe

        Filesize

        492KB

        MD5

        06a7e245796c267e632247162e15be70

        SHA1

        955682b29fa6d098767217c05c5e3a188057fb4a

        SHA256

        42b8e3bfad91cd72ee53613944d5830f07978ca764798a96138a657155442d0e

        SHA512

        cad2476b16334c08c9e8f943220db43f891c338d13fa1ae564d9f3ccf51c38fbc414360cd752085f6f8eec3a8a9e35e4fb28a851f4b2ad135dd24ba33ae1b882

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\FL5um74.exe

        Filesize

        492KB

        MD5

        06a7e245796c267e632247162e15be70

        SHA1

        955682b29fa6d098767217c05c5e3a188057fb4a

        SHA256

        42b8e3bfad91cd72ee53613944d5830f07978ca764798a96138a657155442d0e

        SHA512

        cad2476b16334c08c9e8f943220db43f891c338d13fa1ae564d9f3ccf51c38fbc414360cd752085f6f8eec3a8a9e35e4fb28a851f4b2ad135dd24ba33ae1b882

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1vs87If6.exe

        Filesize

        194KB

        MD5

        6241b03d68a610324ecda52f0f84e287

        SHA1

        da80280b6e3925e455925efd6c6e59a6118269c4

        SHA256

        ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

        SHA512

        a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1vs87If6.exe

        Filesize

        194KB

        MD5

        6241b03d68a610324ecda52f0f84e287

        SHA1

        da80280b6e3925e455925efd6c6e59a6118269c4

        SHA256

        ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

        SHA512

        a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Dq4666.exe

        Filesize

        446KB

        MD5

        a9d964f071843dcc810c6ca60f712e96

        SHA1

        191d3b0bc7f2d38bf95110729f85e53e78918c15

        SHA256

        bfeddab8d6d05480b78d3f146f20b42d21062ac2104c01461e8f9683e76cae12

        SHA512

        0a66d17f8634e61118c2ebaccb3b9c8ffe9b011f6ebf62efaae4c5fe164bab3964575c655d1be6ec00a05b2b4a5456f00400a3cef5b78ff4c8f3086fb1417267

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Dq4666.exe

        Filesize

        446KB

        MD5

        a9d964f071843dcc810c6ca60f712e96

        SHA1

        191d3b0bc7f2d38bf95110729f85e53e78918c15

        SHA256

        bfeddab8d6d05480b78d3f146f20b42d21062ac2104c01461e8f9683e76cae12

        SHA512

        0a66d17f8634e61118c2ebaccb3b9c8ffe9b011f6ebf62efaae4c5fe164bab3964575c655d1be6ec00a05b2b4a5456f00400a3cef5b78ff4c8f3086fb1417267

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fF3ki63.exe

        Filesize

        1.0MB

        MD5

        89187d1ca26efd64d1cf951f936ce404

        SHA1

        49d4e92028a786c57830c9ffa37cfc8ef943282e

        SHA256

        50c727a43c16fee26d81e253532d5d7b64b26d2fefd71876b87a2bc0c7d5534b

        SHA512

        b9a5e92adaf1bc0d3dcbca020a46e35ac3528c15cb668e3f5d0a0132ee084fa1b4dcdced2a2d13356b75a52d51c56188b0a2836201051cb3714d77ac499389f3

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fF3ki63.exe

        Filesize

        1.0MB

        MD5

        89187d1ca26efd64d1cf951f936ce404

        SHA1

        49d4e92028a786c57830c9ffa37cfc8ef943282e

        SHA256

        50c727a43c16fee26d81e253532d5d7b64b26d2fefd71876b87a2bc0c7d5534b

        SHA512

        b9a5e92adaf1bc0d3dcbca020a46e35ac3528c15cb668e3f5d0a0132ee084fa1b4dcdced2a2d13356b75a52d51c56188b0a2836201051cb3714d77ac499389f3

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\BO1Qe19.exe

        Filesize

        746KB

        MD5

        87a96df93b25dd7dcbe09ba70b44a4ff

        SHA1

        80ec7cc634b84707fe1381d81a655a5c63ba3a15

        SHA256

        676e266cfcd532a59cf15a3fc5b8d6aec669f14d0f609c5842733fca913389ff

        SHA512

        b6d676f8b1285aefc1e137419e434d6e1d429f9cd123f9e7c15b89f3bfc84dfec36d6bfd9b45740a4ebee813a3775f0342eb89dfc00853a1c0b3412e53d68a99

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\BO1Qe19.exe

        Filesize

        746KB

        MD5

        87a96df93b25dd7dcbe09ba70b44a4ff

        SHA1

        80ec7cc634b84707fe1381d81a655a5c63ba3a15

        SHA256

        676e266cfcd532a59cf15a3fc5b8d6aec669f14d0f609c5842733fca913389ff

        SHA512

        b6d676f8b1285aefc1e137419e434d6e1d429f9cd123f9e7c15b89f3bfc84dfec36d6bfd9b45740a4ebee813a3775f0342eb89dfc00853a1c0b3412e53d68a99

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\FL5um74.exe

        Filesize

        492KB

        MD5

        06a7e245796c267e632247162e15be70

        SHA1

        955682b29fa6d098767217c05c5e3a188057fb4a

        SHA256

        42b8e3bfad91cd72ee53613944d5830f07978ca764798a96138a657155442d0e

        SHA512

        cad2476b16334c08c9e8f943220db43f891c338d13fa1ae564d9f3ccf51c38fbc414360cd752085f6f8eec3a8a9e35e4fb28a851f4b2ad135dd24ba33ae1b882

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\FL5um74.exe

        Filesize

        492KB

        MD5

        06a7e245796c267e632247162e15be70

        SHA1

        955682b29fa6d098767217c05c5e3a188057fb4a

        SHA256

        42b8e3bfad91cd72ee53613944d5830f07978ca764798a96138a657155442d0e

        SHA512

        cad2476b16334c08c9e8f943220db43f891c338d13fa1ae564d9f3ccf51c38fbc414360cd752085f6f8eec3a8a9e35e4fb28a851f4b2ad135dd24ba33ae1b882

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1vs87If6.exe

        Filesize

        194KB

        MD5

        6241b03d68a610324ecda52f0f84e287

        SHA1

        da80280b6e3925e455925efd6c6e59a6118269c4

        SHA256

        ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

        SHA512

        a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1vs87If6.exe

        Filesize

        194KB

        MD5

        6241b03d68a610324ecda52f0f84e287

        SHA1

        da80280b6e3925e455925efd6c6e59a6118269c4

        SHA256

        ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

        SHA512

        a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Dq4666.exe

        Filesize

        446KB

        MD5

        a9d964f071843dcc810c6ca60f712e96

        SHA1

        191d3b0bc7f2d38bf95110729f85e53e78918c15

        SHA256

        bfeddab8d6d05480b78d3f146f20b42d21062ac2104c01461e8f9683e76cae12

        SHA512

        0a66d17f8634e61118c2ebaccb3b9c8ffe9b011f6ebf62efaae4c5fe164bab3964575c655d1be6ec00a05b2b4a5456f00400a3cef5b78ff4c8f3086fb1417267

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Dq4666.exe

        Filesize

        446KB

        MD5

        a9d964f071843dcc810c6ca60f712e96

        SHA1

        191d3b0bc7f2d38bf95110729f85e53e78918c15

        SHA256

        bfeddab8d6d05480b78d3f146f20b42d21062ac2104c01461e8f9683e76cae12

        SHA512

        0a66d17f8634e61118c2ebaccb3b9c8ffe9b011f6ebf62efaae4c5fe164bab3964575c655d1be6ec00a05b2b4a5456f00400a3cef5b78ff4c8f3086fb1417267

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Dq4666.exe

        Filesize

        446KB

        MD5

        a9d964f071843dcc810c6ca60f712e96

        SHA1

        191d3b0bc7f2d38bf95110729f85e53e78918c15

        SHA256

        bfeddab8d6d05480b78d3f146f20b42d21062ac2104c01461e8f9683e76cae12

        SHA512

        0a66d17f8634e61118c2ebaccb3b9c8ffe9b011f6ebf62efaae4c5fe164bab3964575c655d1be6ec00a05b2b4a5456f00400a3cef5b78ff4c8f3086fb1417267

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Dq4666.exe

        Filesize

        446KB

        MD5

        a9d964f071843dcc810c6ca60f712e96

        SHA1

        191d3b0bc7f2d38bf95110729f85e53e78918c15

        SHA256

        bfeddab8d6d05480b78d3f146f20b42d21062ac2104c01461e8f9683e76cae12

        SHA512

        0a66d17f8634e61118c2ebaccb3b9c8ffe9b011f6ebf62efaae4c5fe164bab3964575c655d1be6ec00a05b2b4a5456f00400a3cef5b78ff4c8f3086fb1417267

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Dq4666.exe

        Filesize

        446KB

        MD5

        a9d964f071843dcc810c6ca60f712e96

        SHA1

        191d3b0bc7f2d38bf95110729f85e53e78918c15

        SHA256

        bfeddab8d6d05480b78d3f146f20b42d21062ac2104c01461e8f9683e76cae12

        SHA512

        0a66d17f8634e61118c2ebaccb3b9c8ffe9b011f6ebf62efaae4c5fe164bab3964575c655d1be6ec00a05b2b4a5456f00400a3cef5b78ff4c8f3086fb1417267

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Dq4666.exe

        Filesize

        446KB

        MD5

        a9d964f071843dcc810c6ca60f712e96

        SHA1

        191d3b0bc7f2d38bf95110729f85e53e78918c15

        SHA256

        bfeddab8d6d05480b78d3f146f20b42d21062ac2104c01461e8f9683e76cae12

        SHA512

        0a66d17f8634e61118c2ebaccb3b9c8ffe9b011f6ebf62efaae4c5fe164bab3964575c655d1be6ec00a05b2b4a5456f00400a3cef5b78ff4c8f3086fb1417267

      • memory/2584-80-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2584-76-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2584-95-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2584-90-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2584-89-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2584-87-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2584-85-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2584-84-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2584-82-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2584-83-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2584-81-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2584-78-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2756-59-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-67-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-49-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-45-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-51-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-53-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-55-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-63-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-65-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-47-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-69-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-61-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-43-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-42-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB

      • memory/2756-41-0x0000000001EC0000-0x0000000001EDC000-memory.dmp

        Filesize

        112KB

      • memory/2756-40-0x00000000004E0000-0x00000000004FE000-memory.dmp

        Filesize

        120KB

      • memory/2756-57-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

        Filesize

        88KB