Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 16:18

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    c7fb5e04031c87759c8008f76dda03b3

  • SHA1

    5afdf7b07be32fe6b709eae2f52c29dfbfb514de

  • SHA256

    7127504002155cc0189e007ba6cab1db0dc33534d2df3bedb42e235e1ab414f5

  • SHA512

    032a6c38a3984998dd37a01ad8e1926ac34090e091184319b87fc55b416e75a68eb7a67381efd5ddcebcff6ab2adfe160b7bbfe74f07ab6bda4bf6d078875fa0

  • SSDEEP

    24576:/yW01U/DwPBEK0jPbEZKRhgArzzs3lFLj5jjwQSHm:KW0iCIaKHPsF/pjM

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nk1wG64.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nk1wG64.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qX9cX59.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qX9cX59.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aw5TK96.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aw5TK96.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3044
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1On58eu0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1On58eu0.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2716
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Fe6310.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Fe6310.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2508
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2204
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2904
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 268
                  7⤵
                  • Program crash
                  PID:1328
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 292
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nk1wG64.exe

      Filesize

      1.0MB

      MD5

      747e37684f3601391f7c34c3bad3b714

      SHA1

      f962f15719a0ba24ea00deab14bdcbae53aa1331

      SHA256

      7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1

      SHA512

      8e7b01da1c0b3e87e7315850674683d0d51c6515157d218f52fa4bb09477f9fe0e8a4ebff8b175c3d5994ed59b44cdb23c79122b8bd21b84561e9009ffcaabd5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nk1wG64.exe

      Filesize

      1.0MB

      MD5

      747e37684f3601391f7c34c3bad3b714

      SHA1

      f962f15719a0ba24ea00deab14bdcbae53aa1331

      SHA256

      7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1

      SHA512

      8e7b01da1c0b3e87e7315850674683d0d51c6515157d218f52fa4bb09477f9fe0e8a4ebff8b175c3d5994ed59b44cdb23c79122b8bd21b84561e9009ffcaabd5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qX9cX59.exe

      Filesize

      743KB

      MD5

      9ff77508fadc21a51a032a904c62a87d

      SHA1

      3edd7dd64f386be42dac83061d2a6644e9695c13

      SHA256

      e5af95224002c430d732fbd0adf080a628e7497f5f138aa39a790372c9cbb33a

      SHA512

      d629a0f7e6eecfea8238914249de4bc813d7569c8e16c00d0ac2905d8fa67e56c5585bca131cc15f536d0e989a0afbc027119f7bdf0c3fa1cf3cfbe7b4d07d3a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qX9cX59.exe

      Filesize

      743KB

      MD5

      9ff77508fadc21a51a032a904c62a87d

      SHA1

      3edd7dd64f386be42dac83061d2a6644e9695c13

      SHA256

      e5af95224002c430d732fbd0adf080a628e7497f5f138aa39a790372c9cbb33a

      SHA512

      d629a0f7e6eecfea8238914249de4bc813d7569c8e16c00d0ac2905d8fa67e56c5585bca131cc15f536d0e989a0afbc027119f7bdf0c3fa1cf3cfbe7b4d07d3a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aw5TK96.exe

      Filesize

      491KB

      MD5

      3040606c64399e8d5a01b4ceb1965bdb

      SHA1

      c19eae83f3ed07f985751331a897b4f4a5e03178

      SHA256

      73818c3fc38f4851e1c1abf1fe2dec895b03d1493e181f6da1912fe86e169f29

      SHA512

      36e2b55a45d8dda31c5e769dfec88341cc90040f4a0bbdff090f76d7298f7ef7427fdb1d10cb5f6e6bf2ff1de8bacb2db64800ef081a875a8c849c7c42899211

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aw5TK96.exe

      Filesize

      491KB

      MD5

      3040606c64399e8d5a01b4ceb1965bdb

      SHA1

      c19eae83f3ed07f985751331a897b4f4a5e03178

      SHA256

      73818c3fc38f4851e1c1abf1fe2dec895b03d1493e181f6da1912fe86e169f29

      SHA512

      36e2b55a45d8dda31c5e769dfec88341cc90040f4a0bbdff090f76d7298f7ef7427fdb1d10cb5f6e6bf2ff1de8bacb2db64800ef081a875a8c849c7c42899211

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1On58eu0.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1On58eu0.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Fe6310.exe

      Filesize

      445KB

      MD5

      59d72316ce680d4c9be5648586c2c5c1

      SHA1

      eca6e05bdc29d35b0168a9724063c1e180580671

      SHA256

      06d3ee4e9c53bf05477233eba404360752e190b2b61520643304dd50bd9bff67

      SHA512

      8469f5c876cd31f4f2010838b7f83d8e76f16feebc5e002d7bbb9624e53b3f36cc31c430287cca7ca91fb033d7d700ae5f47137a52fe5c95b7f4fde47c8eabde

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Fe6310.exe

      Filesize

      445KB

      MD5

      59d72316ce680d4c9be5648586c2c5c1

      SHA1

      eca6e05bdc29d35b0168a9724063c1e180580671

      SHA256

      06d3ee4e9c53bf05477233eba404360752e190b2b61520643304dd50bd9bff67

      SHA512

      8469f5c876cd31f4f2010838b7f83d8e76f16feebc5e002d7bbb9624e53b3f36cc31c430287cca7ca91fb033d7d700ae5f47137a52fe5c95b7f4fde47c8eabde

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\nk1wG64.exe

      Filesize

      1.0MB

      MD5

      747e37684f3601391f7c34c3bad3b714

      SHA1

      f962f15719a0ba24ea00deab14bdcbae53aa1331

      SHA256

      7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1

      SHA512

      8e7b01da1c0b3e87e7315850674683d0d51c6515157d218f52fa4bb09477f9fe0e8a4ebff8b175c3d5994ed59b44cdb23c79122b8bd21b84561e9009ffcaabd5

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\nk1wG64.exe

      Filesize

      1.0MB

      MD5

      747e37684f3601391f7c34c3bad3b714

      SHA1

      f962f15719a0ba24ea00deab14bdcbae53aa1331

      SHA256

      7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1

      SHA512

      8e7b01da1c0b3e87e7315850674683d0d51c6515157d218f52fa4bb09477f9fe0e8a4ebff8b175c3d5994ed59b44cdb23c79122b8bd21b84561e9009ffcaabd5

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qX9cX59.exe

      Filesize

      743KB

      MD5

      9ff77508fadc21a51a032a904c62a87d

      SHA1

      3edd7dd64f386be42dac83061d2a6644e9695c13

      SHA256

      e5af95224002c430d732fbd0adf080a628e7497f5f138aa39a790372c9cbb33a

      SHA512

      d629a0f7e6eecfea8238914249de4bc813d7569c8e16c00d0ac2905d8fa67e56c5585bca131cc15f536d0e989a0afbc027119f7bdf0c3fa1cf3cfbe7b4d07d3a

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qX9cX59.exe

      Filesize

      743KB

      MD5

      9ff77508fadc21a51a032a904c62a87d

      SHA1

      3edd7dd64f386be42dac83061d2a6644e9695c13

      SHA256

      e5af95224002c430d732fbd0adf080a628e7497f5f138aa39a790372c9cbb33a

      SHA512

      d629a0f7e6eecfea8238914249de4bc813d7569c8e16c00d0ac2905d8fa67e56c5585bca131cc15f536d0e989a0afbc027119f7bdf0c3fa1cf3cfbe7b4d07d3a

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\aw5TK96.exe

      Filesize

      491KB

      MD5

      3040606c64399e8d5a01b4ceb1965bdb

      SHA1

      c19eae83f3ed07f985751331a897b4f4a5e03178

      SHA256

      73818c3fc38f4851e1c1abf1fe2dec895b03d1493e181f6da1912fe86e169f29

      SHA512

      36e2b55a45d8dda31c5e769dfec88341cc90040f4a0bbdff090f76d7298f7ef7427fdb1d10cb5f6e6bf2ff1de8bacb2db64800ef081a875a8c849c7c42899211

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\aw5TK96.exe

      Filesize

      491KB

      MD5

      3040606c64399e8d5a01b4ceb1965bdb

      SHA1

      c19eae83f3ed07f985751331a897b4f4a5e03178

      SHA256

      73818c3fc38f4851e1c1abf1fe2dec895b03d1493e181f6da1912fe86e169f29

      SHA512

      36e2b55a45d8dda31c5e769dfec88341cc90040f4a0bbdff090f76d7298f7ef7427fdb1d10cb5f6e6bf2ff1de8bacb2db64800ef081a875a8c849c7c42899211

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1On58eu0.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1On58eu0.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Fe6310.exe

      Filesize

      445KB

      MD5

      59d72316ce680d4c9be5648586c2c5c1

      SHA1

      eca6e05bdc29d35b0168a9724063c1e180580671

      SHA256

      06d3ee4e9c53bf05477233eba404360752e190b2b61520643304dd50bd9bff67

      SHA512

      8469f5c876cd31f4f2010838b7f83d8e76f16feebc5e002d7bbb9624e53b3f36cc31c430287cca7ca91fb033d7d700ae5f47137a52fe5c95b7f4fde47c8eabde

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Fe6310.exe

      Filesize

      445KB

      MD5

      59d72316ce680d4c9be5648586c2c5c1

      SHA1

      eca6e05bdc29d35b0168a9724063c1e180580671

      SHA256

      06d3ee4e9c53bf05477233eba404360752e190b2b61520643304dd50bd9bff67

      SHA512

      8469f5c876cd31f4f2010838b7f83d8e76f16feebc5e002d7bbb9624e53b3f36cc31c430287cca7ca91fb033d7d700ae5f47137a52fe5c95b7f4fde47c8eabde

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Fe6310.exe

      Filesize

      445KB

      MD5

      59d72316ce680d4c9be5648586c2c5c1

      SHA1

      eca6e05bdc29d35b0168a9724063c1e180580671

      SHA256

      06d3ee4e9c53bf05477233eba404360752e190b2b61520643304dd50bd9bff67

      SHA512

      8469f5c876cd31f4f2010838b7f83d8e76f16feebc5e002d7bbb9624e53b3f36cc31c430287cca7ca91fb033d7d700ae5f47137a52fe5c95b7f4fde47c8eabde

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Fe6310.exe

      Filesize

      445KB

      MD5

      59d72316ce680d4c9be5648586c2c5c1

      SHA1

      eca6e05bdc29d35b0168a9724063c1e180580671

      SHA256

      06d3ee4e9c53bf05477233eba404360752e190b2b61520643304dd50bd9bff67

      SHA512

      8469f5c876cd31f4f2010838b7f83d8e76f16feebc5e002d7bbb9624e53b3f36cc31c430287cca7ca91fb033d7d700ae5f47137a52fe5c95b7f4fde47c8eabde

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Fe6310.exe

      Filesize

      445KB

      MD5

      59d72316ce680d4c9be5648586c2c5c1

      SHA1

      eca6e05bdc29d35b0168a9724063c1e180580671

      SHA256

      06d3ee4e9c53bf05477233eba404360752e190b2b61520643304dd50bd9bff67

      SHA512

      8469f5c876cd31f4f2010838b7f83d8e76f16feebc5e002d7bbb9624e53b3f36cc31c430287cca7ca91fb033d7d700ae5f47137a52fe5c95b7f4fde47c8eabde

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Fe6310.exe

      Filesize

      445KB

      MD5

      59d72316ce680d4c9be5648586c2c5c1

      SHA1

      eca6e05bdc29d35b0168a9724063c1e180580671

      SHA256

      06d3ee4e9c53bf05477233eba404360752e190b2b61520643304dd50bd9bff67

      SHA512

      8469f5c876cd31f4f2010838b7f83d8e76f16feebc5e002d7bbb9624e53b3f36cc31c430287cca7ca91fb033d7d700ae5f47137a52fe5c95b7f4fde47c8eabde

    • memory/2716-45-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-47-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-61-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-59-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-55-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-53-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-51-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-49-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-42-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-65-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-43-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-41-0x0000000002380000-0x000000000239C000-memory.dmp

      Filesize

      112KB

    • memory/2716-40-0x0000000002360000-0x000000000237E000-memory.dmp

      Filesize

      120KB

    • memory/2716-63-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-57-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-67-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2716-69-0x0000000002380000-0x0000000002396000-memory.dmp

      Filesize

      88KB

    • memory/2904-76-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2904-82-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2904-84-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2904-85-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2904-87-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2904-89-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2904-80-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2904-79-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2904-78-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2904-77-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB