Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 14:04

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    9da1cecf7697d9fea854a01e67034695

  • SHA1

    a36bdef6961eccac9d3d7913e5873ecc05cfa8a4

  • SHA256

    7c135dbebf3ef7b2c6ee89bdf72f572a8091491bc17d44a39e379cf6bcfbc52d

  • SHA512

    c2b49dcd6329600d2eacee4543308876f938baca08a6817f883de058a298d05a99de49496218ee3c36f01dd4f3ce5f75e4a3b2f6b3ff9a81ba69601f832f31f7

  • SSDEEP

    24576:Zyb5w5Vp9qC+EbFyhYAMWJ0zQl2s8YegazU7YDCk:MSp9qpKAfqzQlJSHzU0DC

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vz5Sf90.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vz5Sf90.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ge3Gr49.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ge3Gr49.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cu4nz73.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cu4nz73.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2680
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1lr08VH4.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1lr08VH4.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2308
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2356
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1760
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 268
                7⤵
                • Program crash
                PID:2960
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vz5Sf90.exe

    Filesize

    1.0MB

    MD5

    70276a3283b89323493d36715dcd37a6

    SHA1

    e001501c927b2c9c861245d7ba8ee6a111cb38f1

    SHA256

    d7c5528dd22366535a35e095a9975042281b5d7ee875dc4fa86d6c16f4606d5c

    SHA512

    364a3868f14053eac1f90c7bb58f8032c2136dc8f83d3b52db70c7296b91f13063a4a328f82a7601b2cfd08e79571e7f2c366fae15d3ed359b7d4714af817fb5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vz5Sf90.exe

    Filesize

    1.0MB

    MD5

    70276a3283b89323493d36715dcd37a6

    SHA1

    e001501c927b2c9c861245d7ba8ee6a111cb38f1

    SHA256

    d7c5528dd22366535a35e095a9975042281b5d7ee875dc4fa86d6c16f4606d5c

    SHA512

    364a3868f14053eac1f90c7bb58f8032c2136dc8f83d3b52db70c7296b91f13063a4a328f82a7601b2cfd08e79571e7f2c366fae15d3ed359b7d4714af817fb5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ge3Gr49.exe

    Filesize

    744KB

    MD5

    bd482d8ccefbb511b7c14817c174619b

    SHA1

    23d0bd597726387f3efb5e5d7f1949250fa4f60e

    SHA256

    b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7

    SHA512

    07f6d45da2b34949c843dad1d125569ba9cc52601eaa3d45eee7c327aa058cb9a6ab2265509d1dbf59bc16e68860bf77313e0f04e015a86bc74f87a608207fbe

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ge3Gr49.exe

    Filesize

    744KB

    MD5

    bd482d8ccefbb511b7c14817c174619b

    SHA1

    23d0bd597726387f3efb5e5d7f1949250fa4f60e

    SHA256

    b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7

    SHA512

    07f6d45da2b34949c843dad1d125569ba9cc52601eaa3d45eee7c327aa058cb9a6ab2265509d1dbf59bc16e68860bf77313e0f04e015a86bc74f87a608207fbe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cu4nz73.exe

    Filesize

    493KB

    MD5

    56c9df7d6d0aad2e1d07719e953acffa

    SHA1

    72ef85c62a94e0977b7f9f5384ddef6f95a64e75

    SHA256

    27e38995cd3a28ba8ab2e254bfe5346fa672b5be55f3f0a3037683679b1867ac

    SHA512

    0b6ad9190b79f8e5aad03ba01a4ccb9fc11cff2c1a6e030694b89bc30f710914674f3610e7ce7c24b83b5af86c4a0f24a025c80d8b863b139e291d585f19a5aa

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cu4nz73.exe

    Filesize

    493KB

    MD5

    56c9df7d6d0aad2e1d07719e953acffa

    SHA1

    72ef85c62a94e0977b7f9f5384ddef6f95a64e75

    SHA256

    27e38995cd3a28ba8ab2e254bfe5346fa672b5be55f3f0a3037683679b1867ac

    SHA512

    0b6ad9190b79f8e5aad03ba01a4ccb9fc11cff2c1a6e030694b89bc30f710914674f3610e7ce7c24b83b5af86c4a0f24a025c80d8b863b139e291d585f19a5aa

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1lr08VH4.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1lr08VH4.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe

    Filesize

    448KB

    MD5

    218046ecb246024529d46697c6016a0b

    SHA1

    3c19e905606b34e3242d0ed4c9e04e00bfe7fe13

    SHA256

    434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40

    SHA512

    365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe

    Filesize

    448KB

    MD5

    218046ecb246024529d46697c6016a0b

    SHA1

    3c19e905606b34e3242d0ed4c9e04e00bfe7fe13

    SHA256

    434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40

    SHA512

    365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vz5Sf90.exe

    Filesize

    1.0MB

    MD5

    70276a3283b89323493d36715dcd37a6

    SHA1

    e001501c927b2c9c861245d7ba8ee6a111cb38f1

    SHA256

    d7c5528dd22366535a35e095a9975042281b5d7ee875dc4fa86d6c16f4606d5c

    SHA512

    364a3868f14053eac1f90c7bb58f8032c2136dc8f83d3b52db70c7296b91f13063a4a328f82a7601b2cfd08e79571e7f2c366fae15d3ed359b7d4714af817fb5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vz5Sf90.exe

    Filesize

    1.0MB

    MD5

    70276a3283b89323493d36715dcd37a6

    SHA1

    e001501c927b2c9c861245d7ba8ee6a111cb38f1

    SHA256

    d7c5528dd22366535a35e095a9975042281b5d7ee875dc4fa86d6c16f4606d5c

    SHA512

    364a3868f14053eac1f90c7bb58f8032c2136dc8f83d3b52db70c7296b91f13063a4a328f82a7601b2cfd08e79571e7f2c366fae15d3ed359b7d4714af817fb5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Ge3Gr49.exe

    Filesize

    744KB

    MD5

    bd482d8ccefbb511b7c14817c174619b

    SHA1

    23d0bd597726387f3efb5e5d7f1949250fa4f60e

    SHA256

    b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7

    SHA512

    07f6d45da2b34949c843dad1d125569ba9cc52601eaa3d45eee7c327aa058cb9a6ab2265509d1dbf59bc16e68860bf77313e0f04e015a86bc74f87a608207fbe

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Ge3Gr49.exe

    Filesize

    744KB

    MD5

    bd482d8ccefbb511b7c14817c174619b

    SHA1

    23d0bd597726387f3efb5e5d7f1949250fa4f60e

    SHA256

    b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7

    SHA512

    07f6d45da2b34949c843dad1d125569ba9cc52601eaa3d45eee7c327aa058cb9a6ab2265509d1dbf59bc16e68860bf77313e0f04e015a86bc74f87a608207fbe

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\cu4nz73.exe

    Filesize

    493KB

    MD5

    56c9df7d6d0aad2e1d07719e953acffa

    SHA1

    72ef85c62a94e0977b7f9f5384ddef6f95a64e75

    SHA256

    27e38995cd3a28ba8ab2e254bfe5346fa672b5be55f3f0a3037683679b1867ac

    SHA512

    0b6ad9190b79f8e5aad03ba01a4ccb9fc11cff2c1a6e030694b89bc30f710914674f3610e7ce7c24b83b5af86c4a0f24a025c80d8b863b139e291d585f19a5aa

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\cu4nz73.exe

    Filesize

    493KB

    MD5

    56c9df7d6d0aad2e1d07719e953acffa

    SHA1

    72ef85c62a94e0977b7f9f5384ddef6f95a64e75

    SHA256

    27e38995cd3a28ba8ab2e254bfe5346fa672b5be55f3f0a3037683679b1867ac

    SHA512

    0b6ad9190b79f8e5aad03ba01a4ccb9fc11cff2c1a6e030694b89bc30f710914674f3610e7ce7c24b83b5af86c4a0f24a025c80d8b863b139e291d585f19a5aa

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1lr08VH4.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1lr08VH4.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe

    Filesize

    448KB

    MD5

    218046ecb246024529d46697c6016a0b

    SHA1

    3c19e905606b34e3242d0ed4c9e04e00bfe7fe13

    SHA256

    434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40

    SHA512

    365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe

    Filesize

    448KB

    MD5

    218046ecb246024529d46697c6016a0b

    SHA1

    3c19e905606b34e3242d0ed4c9e04e00bfe7fe13

    SHA256

    434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40

    SHA512

    365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe

    Filesize

    448KB

    MD5

    218046ecb246024529d46697c6016a0b

    SHA1

    3c19e905606b34e3242d0ed4c9e04e00bfe7fe13

    SHA256

    434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40

    SHA512

    365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe

    Filesize

    448KB

    MD5

    218046ecb246024529d46697c6016a0b

    SHA1

    3c19e905606b34e3242d0ed4c9e04e00bfe7fe13

    SHA256

    434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40

    SHA512

    365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe

    Filesize

    448KB

    MD5

    218046ecb246024529d46697c6016a0b

    SHA1

    3c19e905606b34e3242d0ed4c9e04e00bfe7fe13

    SHA256

    434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40

    SHA512

    365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe

    Filesize

    448KB

    MD5

    218046ecb246024529d46697c6016a0b

    SHA1

    3c19e905606b34e3242d0ed4c9e04e00bfe7fe13

    SHA256

    434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40

    SHA512

    365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6

  • memory/1760-85-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1760-87-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1760-76-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1760-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1760-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1760-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1760-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1760-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1760-78-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1760-77-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2308-61-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-59-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-40-0x0000000000370000-0x000000000038E000-memory.dmp

    Filesize

    120KB

  • memory/2308-42-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-43-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-49-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-51-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-53-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-57-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-41-0x0000000000670000-0x000000000068C000-memory.dmp

    Filesize

    112KB

  • memory/2308-45-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-65-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-67-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-69-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-63-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-55-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/2308-47-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB