Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 13:04

General

  • Target

    f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776.exe

  • Size

    1.1MB

  • MD5

    94154f9dab2359231571870c2cee910f

  • SHA1

    cfcc4227bce9540644c7f5a9094da58936cf8d90

  • SHA256

    f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776

  • SHA512

    da4709298568c0a3d9644ec8ebc594593f62c9fd9d9628627d9df568efb093b47adb851123892cc61a0df68a2d4fce52651a7c9cabd243b12bd5f454ad800fb2

  • SSDEEP

    24576:yyLxsNFJJ9KwfheAhWDpPFiYwf5U1w2Kt0vaWeVbjnL9/17+t:Ze1J9KwfheAhWDpPFirU+2LUbjnL9V

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776.exe
    "C:\Users\Admin\AppData\Local\Temp\f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2664
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2164
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 268
                7⤵
                • Program crash
                PID:2712
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe

    Filesize

    1021KB

    MD5

    a68389a13b41d256f74894460eb388d5

    SHA1

    55fe8eca43ee7717ffea6f422f2490c14c7b0dab

    SHA256

    3afc5b8e1d8915401a9ff7c69762a0ab868342dfea6e39b4606bb997a76fde99

    SHA512

    6e07438b687a730e383ac90a857ff1c83f1bd8f5ff5408618e0a1af8a2046918f08abcab4f390c8477e575b96fb36362bc8f48e37df0dfe00d0807b47b88156d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe

    Filesize

    1021KB

    MD5

    a68389a13b41d256f74894460eb388d5

    SHA1

    55fe8eca43ee7717ffea6f422f2490c14c7b0dab

    SHA256

    3afc5b8e1d8915401a9ff7c69762a0ab868342dfea6e39b4606bb997a76fde99

    SHA512

    6e07438b687a730e383ac90a857ff1c83f1bd8f5ff5408618e0a1af8a2046918f08abcab4f390c8477e575b96fb36362bc8f48e37df0dfe00d0807b47b88156d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe

    Filesize

    725KB

    MD5

    bfba4e306e9ba9da2a93edf5943233ab

    SHA1

    39ecb9932b7dc412d75ec26a354f00df5b2e3a5c

    SHA256

    b7b26869bf6a1bbcda73bebc5c749d60835907f467d9464838a37bda01eaa8dd

    SHA512

    c4ad38dc1a6ddbb3f7c4deda39b6c55a8a5678f6671ca5d96cee7b4794016c846c75621c1bab234be7c09a47a8fa4041074eceed13c05bb497bc7437de19b999

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe

    Filesize

    725KB

    MD5

    bfba4e306e9ba9da2a93edf5943233ab

    SHA1

    39ecb9932b7dc412d75ec26a354f00df5b2e3a5c

    SHA256

    b7b26869bf6a1bbcda73bebc5c749d60835907f467d9464838a37bda01eaa8dd

    SHA512

    c4ad38dc1a6ddbb3f7c4deda39b6c55a8a5678f6671ca5d96cee7b4794016c846c75621c1bab234be7c09a47a8fa4041074eceed13c05bb497bc7437de19b999

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe

    Filesize

    479KB

    MD5

    34d6f3a9e880896778b5714f92a5492b

    SHA1

    012560910a378f624a42b7b3f573912d439aead8

    SHA256

    58f110d0fab810cc3420e71ee59a83485f4491f68fdb572a6c902da620e37762

    SHA512

    f0aa648fc8ceb32719cf0739de975b941ed1b5e83ea4050e024046cb052b0ad68ee34d48e7f0aef287352455fd5ec22989c392bddcee4c7bc74980f12236f42c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe

    Filesize

    479KB

    MD5

    34d6f3a9e880896778b5714f92a5492b

    SHA1

    012560910a378f624a42b7b3f573912d439aead8

    SHA256

    58f110d0fab810cc3420e71ee59a83485f4491f68fdb572a6c902da620e37762

    SHA512

    f0aa648fc8ceb32719cf0739de975b941ed1b5e83ea4050e024046cb052b0ad68ee34d48e7f0aef287352455fd5ec22989c392bddcee4c7bc74980f12236f42c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

    Filesize

    423KB

    MD5

    cced1f2ff28b2f86a221efe1158f543f

    SHA1

    049c3a3890d7ce5e1f0670ee3f0194bb11342f85

    SHA256

    ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

    SHA512

    29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

    Filesize

    423KB

    MD5

    cced1f2ff28b2f86a221efe1158f543f

    SHA1

    049c3a3890d7ce5e1f0670ee3f0194bb11342f85

    SHA256

    ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

    SHA512

    29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

    Filesize

    423KB

    MD5

    cced1f2ff28b2f86a221efe1158f543f

    SHA1

    049c3a3890d7ce5e1f0670ee3f0194bb11342f85

    SHA256

    ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

    SHA512

    29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe

    Filesize

    1021KB

    MD5

    a68389a13b41d256f74894460eb388d5

    SHA1

    55fe8eca43ee7717ffea6f422f2490c14c7b0dab

    SHA256

    3afc5b8e1d8915401a9ff7c69762a0ab868342dfea6e39b4606bb997a76fde99

    SHA512

    6e07438b687a730e383ac90a857ff1c83f1bd8f5ff5408618e0a1af8a2046918f08abcab4f390c8477e575b96fb36362bc8f48e37df0dfe00d0807b47b88156d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe

    Filesize

    1021KB

    MD5

    a68389a13b41d256f74894460eb388d5

    SHA1

    55fe8eca43ee7717ffea6f422f2490c14c7b0dab

    SHA256

    3afc5b8e1d8915401a9ff7c69762a0ab868342dfea6e39b4606bb997a76fde99

    SHA512

    6e07438b687a730e383ac90a857ff1c83f1bd8f5ff5408618e0a1af8a2046918f08abcab4f390c8477e575b96fb36362bc8f48e37df0dfe00d0807b47b88156d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe

    Filesize

    725KB

    MD5

    bfba4e306e9ba9da2a93edf5943233ab

    SHA1

    39ecb9932b7dc412d75ec26a354f00df5b2e3a5c

    SHA256

    b7b26869bf6a1bbcda73bebc5c749d60835907f467d9464838a37bda01eaa8dd

    SHA512

    c4ad38dc1a6ddbb3f7c4deda39b6c55a8a5678f6671ca5d96cee7b4794016c846c75621c1bab234be7c09a47a8fa4041074eceed13c05bb497bc7437de19b999

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe

    Filesize

    725KB

    MD5

    bfba4e306e9ba9da2a93edf5943233ab

    SHA1

    39ecb9932b7dc412d75ec26a354f00df5b2e3a5c

    SHA256

    b7b26869bf6a1bbcda73bebc5c749d60835907f467d9464838a37bda01eaa8dd

    SHA512

    c4ad38dc1a6ddbb3f7c4deda39b6c55a8a5678f6671ca5d96cee7b4794016c846c75621c1bab234be7c09a47a8fa4041074eceed13c05bb497bc7437de19b999

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe

    Filesize

    479KB

    MD5

    34d6f3a9e880896778b5714f92a5492b

    SHA1

    012560910a378f624a42b7b3f573912d439aead8

    SHA256

    58f110d0fab810cc3420e71ee59a83485f4491f68fdb572a6c902da620e37762

    SHA512

    f0aa648fc8ceb32719cf0739de975b941ed1b5e83ea4050e024046cb052b0ad68ee34d48e7f0aef287352455fd5ec22989c392bddcee4c7bc74980f12236f42c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe

    Filesize

    479KB

    MD5

    34d6f3a9e880896778b5714f92a5492b

    SHA1

    012560910a378f624a42b7b3f573912d439aead8

    SHA256

    58f110d0fab810cc3420e71ee59a83485f4491f68fdb572a6c902da620e37762

    SHA512

    f0aa648fc8ceb32719cf0739de975b941ed1b5e83ea4050e024046cb052b0ad68ee34d48e7f0aef287352455fd5ec22989c392bddcee4c7bc74980f12236f42c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

    Filesize

    423KB

    MD5

    cced1f2ff28b2f86a221efe1158f543f

    SHA1

    049c3a3890d7ce5e1f0670ee3f0194bb11342f85

    SHA256

    ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

    SHA512

    29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

    Filesize

    423KB

    MD5

    cced1f2ff28b2f86a221efe1158f543f

    SHA1

    049c3a3890d7ce5e1f0670ee3f0194bb11342f85

    SHA256

    ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

    SHA512

    29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

    Filesize

    423KB

    MD5

    cced1f2ff28b2f86a221efe1158f543f

    SHA1

    049c3a3890d7ce5e1f0670ee3f0194bb11342f85

    SHA256

    ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

    SHA512

    29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

    Filesize

    423KB

    MD5

    cced1f2ff28b2f86a221efe1158f543f

    SHA1

    049c3a3890d7ce5e1f0670ee3f0194bb11342f85

    SHA256

    ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

    SHA512

    29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

    Filesize

    423KB

    MD5

    cced1f2ff28b2f86a221efe1158f543f

    SHA1

    049c3a3890d7ce5e1f0670ee3f0194bb11342f85

    SHA256

    ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

    SHA512

    29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

    Filesize

    423KB

    MD5

    cced1f2ff28b2f86a221efe1158f543f

    SHA1

    049c3a3890d7ce5e1f0670ee3f0194bb11342f85

    SHA256

    ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

    SHA512

    29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

    Filesize

    423KB

    MD5

    cced1f2ff28b2f86a221efe1158f543f

    SHA1

    049c3a3890d7ce5e1f0670ee3f0194bb11342f85

    SHA256

    ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

    SHA512

    29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

  • memory/2164-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-88-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-86-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2164-84-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-82-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-65-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-55-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-47-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-45-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-53-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-67-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-69-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-63-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-51-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-49-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-57-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-59-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-61-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-43-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-42-0x0000000000560000-0x0000000000576000-memory.dmp

    Filesize

    88KB

  • memory/2664-41-0x0000000000560000-0x000000000057C000-memory.dmp

    Filesize

    112KB

  • memory/2664-40-0x00000000003D0000-0x00000000003EE000-memory.dmp

    Filesize

    120KB