Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:33

General

  • Target

    46c10c756b60e1e347c90075305af6bbf7b194308adcf46a76c54bb6fd7e1489_JC.exe

  • Size

    1.1MB

  • MD5

    e5711244592efa98419648c61c689b99

  • SHA1

    3b0a311d648d7f4114526dfe0aef0d89d0451ad7

  • SHA256

    46c10c756b60e1e347c90075305af6bbf7b194308adcf46a76c54bb6fd7e1489

  • SHA512

    7a62d0bc8ba5dbd7b8c8ff961f2bd10690b0535921ff04e79e866b250718658a75120f1de6bac6a9f395ac5704408a754fd4423bb52f66a2c4580ec99bfc614b

  • SSDEEP

    24576:hyt/z477EKPh8M2vVjxTn8IDl4NlaDEvRPkOcTU9d:UlT283vVjmI2NlaDCSTU

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46c10c756b60e1e347c90075305af6bbf7b194308adcf46a76c54bb6fd7e1489_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\46c10c756b60e1e347c90075305af6bbf7b194308adcf46a76c54bb6fd7e1489_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iT6vJ86.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iT6vJ86.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Db4Ek50.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Db4Ek50.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\JM2Ra42.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\JM2Ra42.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2292
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xl59zT3.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xl59zT3.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2800
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2496
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3000
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 268
                7⤵
                • Program crash
                PID:528
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iT6vJ86.exe

    Filesize

    1021KB

    MD5

    c746103614daf85b6b5ea37b388116ca

    SHA1

    6c00a6d0020ad6ffb0b75d624a2706e01941c0a4

    SHA256

    61ba9ddbd7a49f4b854b5e66ff593a70ac4c82fd7046542e603ed237e89fdd28

    SHA512

    ded404c7d020cc5e5bf7a88377b0c14d4937be8c4a9b47e42a3e9e3e03100ad167454b315d4d3bbf6022304131d8d24232a6abfceb90c14b78b4c220d4619c4e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iT6vJ86.exe

    Filesize

    1021KB

    MD5

    c746103614daf85b6b5ea37b388116ca

    SHA1

    6c00a6d0020ad6ffb0b75d624a2706e01941c0a4

    SHA256

    61ba9ddbd7a49f4b854b5e66ff593a70ac4c82fd7046542e603ed237e89fdd28

    SHA512

    ded404c7d020cc5e5bf7a88377b0c14d4937be8c4a9b47e42a3e9e3e03100ad167454b315d4d3bbf6022304131d8d24232a6abfceb90c14b78b4c220d4619c4e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Db4Ek50.exe

    Filesize

    725KB

    MD5

    5b0040fa62ac98909679478009d31c7c

    SHA1

    2f0371742c9e3cf7241052cb3179391f08a3c3e2

    SHA256

    af37e0dc1283e43aec85241dd9678cbbf53c518ef2e4b6c3a36af8b59a8bed44

    SHA512

    5f43ffb3cf0f004aac5d4067092aeb7cc0eb5eee4bdb255ed2d9f5372b400a6561fb1836cfc5e1e5c9b6bd5fb631b33c98e3f9cb570ebbf76c3007fe7379cf22

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Db4Ek50.exe

    Filesize

    725KB

    MD5

    5b0040fa62ac98909679478009d31c7c

    SHA1

    2f0371742c9e3cf7241052cb3179391f08a3c3e2

    SHA256

    af37e0dc1283e43aec85241dd9678cbbf53c518ef2e4b6c3a36af8b59a8bed44

    SHA512

    5f43ffb3cf0f004aac5d4067092aeb7cc0eb5eee4bdb255ed2d9f5372b400a6561fb1836cfc5e1e5c9b6bd5fb631b33c98e3f9cb570ebbf76c3007fe7379cf22

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\JM2Ra42.exe

    Filesize

    479KB

    MD5

    a30e426b5bfaf65586d807adf664f7bf

    SHA1

    0d648220375ea4e580e996ad2b5077505252bed3

    SHA256

    53174cb232a25397934fb17b9f677229e08200379f3471469879cfac89107f7c

    SHA512

    1e47a20f44b96ba34c661f88e0b50cbd141b30b377f56e396a221bc7fda294cd80adc43b67db6f3561724657c1ff8b3e62b6a63f964bfeb31036f6dd352a9be2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\JM2Ra42.exe

    Filesize

    479KB

    MD5

    a30e426b5bfaf65586d807adf664f7bf

    SHA1

    0d648220375ea4e580e996ad2b5077505252bed3

    SHA256

    53174cb232a25397934fb17b9f677229e08200379f3471469879cfac89107f7c

    SHA512

    1e47a20f44b96ba34c661f88e0b50cbd141b30b377f56e396a221bc7fda294cd80adc43b67db6f3561724657c1ff8b3e62b6a63f964bfeb31036f6dd352a9be2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xl59zT3.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xl59zT3.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe

    Filesize

    423KB

    MD5

    000e235c2a0a726353bda45919a83309

    SHA1

    d2e18efc22379ecb5c3d459fff4436b63a79b9b7

    SHA256

    33fcbef538eb8afb4d60b2ee020008c16e10a3a55003057668ac8772cb819611

    SHA512

    0a5a82a40cdf8470bfd49a62c578a88e1f1c521f75c286303d049447373f1a3d3d284c6529a30d56923f1355ba3cbd571d50e53f3b27f67c835a56c3f07940be

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe

    Filesize

    423KB

    MD5

    000e235c2a0a726353bda45919a83309

    SHA1

    d2e18efc22379ecb5c3d459fff4436b63a79b9b7

    SHA256

    33fcbef538eb8afb4d60b2ee020008c16e10a3a55003057668ac8772cb819611

    SHA512

    0a5a82a40cdf8470bfd49a62c578a88e1f1c521f75c286303d049447373f1a3d3d284c6529a30d56923f1355ba3cbd571d50e53f3b27f67c835a56c3f07940be

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe

    Filesize

    423KB

    MD5

    000e235c2a0a726353bda45919a83309

    SHA1

    d2e18efc22379ecb5c3d459fff4436b63a79b9b7

    SHA256

    33fcbef538eb8afb4d60b2ee020008c16e10a3a55003057668ac8772cb819611

    SHA512

    0a5a82a40cdf8470bfd49a62c578a88e1f1c521f75c286303d049447373f1a3d3d284c6529a30d56923f1355ba3cbd571d50e53f3b27f67c835a56c3f07940be

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\iT6vJ86.exe

    Filesize

    1021KB

    MD5

    c746103614daf85b6b5ea37b388116ca

    SHA1

    6c00a6d0020ad6ffb0b75d624a2706e01941c0a4

    SHA256

    61ba9ddbd7a49f4b854b5e66ff593a70ac4c82fd7046542e603ed237e89fdd28

    SHA512

    ded404c7d020cc5e5bf7a88377b0c14d4937be8c4a9b47e42a3e9e3e03100ad167454b315d4d3bbf6022304131d8d24232a6abfceb90c14b78b4c220d4619c4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\iT6vJ86.exe

    Filesize

    1021KB

    MD5

    c746103614daf85b6b5ea37b388116ca

    SHA1

    6c00a6d0020ad6ffb0b75d624a2706e01941c0a4

    SHA256

    61ba9ddbd7a49f4b854b5e66ff593a70ac4c82fd7046542e603ed237e89fdd28

    SHA512

    ded404c7d020cc5e5bf7a88377b0c14d4937be8c4a9b47e42a3e9e3e03100ad167454b315d4d3bbf6022304131d8d24232a6abfceb90c14b78b4c220d4619c4e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Db4Ek50.exe

    Filesize

    725KB

    MD5

    5b0040fa62ac98909679478009d31c7c

    SHA1

    2f0371742c9e3cf7241052cb3179391f08a3c3e2

    SHA256

    af37e0dc1283e43aec85241dd9678cbbf53c518ef2e4b6c3a36af8b59a8bed44

    SHA512

    5f43ffb3cf0f004aac5d4067092aeb7cc0eb5eee4bdb255ed2d9f5372b400a6561fb1836cfc5e1e5c9b6bd5fb631b33c98e3f9cb570ebbf76c3007fe7379cf22

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Db4Ek50.exe

    Filesize

    725KB

    MD5

    5b0040fa62ac98909679478009d31c7c

    SHA1

    2f0371742c9e3cf7241052cb3179391f08a3c3e2

    SHA256

    af37e0dc1283e43aec85241dd9678cbbf53c518ef2e4b6c3a36af8b59a8bed44

    SHA512

    5f43ffb3cf0f004aac5d4067092aeb7cc0eb5eee4bdb255ed2d9f5372b400a6561fb1836cfc5e1e5c9b6bd5fb631b33c98e3f9cb570ebbf76c3007fe7379cf22

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\JM2Ra42.exe

    Filesize

    479KB

    MD5

    a30e426b5bfaf65586d807adf664f7bf

    SHA1

    0d648220375ea4e580e996ad2b5077505252bed3

    SHA256

    53174cb232a25397934fb17b9f677229e08200379f3471469879cfac89107f7c

    SHA512

    1e47a20f44b96ba34c661f88e0b50cbd141b30b377f56e396a221bc7fda294cd80adc43b67db6f3561724657c1ff8b3e62b6a63f964bfeb31036f6dd352a9be2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\JM2Ra42.exe

    Filesize

    479KB

    MD5

    a30e426b5bfaf65586d807adf664f7bf

    SHA1

    0d648220375ea4e580e996ad2b5077505252bed3

    SHA256

    53174cb232a25397934fb17b9f677229e08200379f3471469879cfac89107f7c

    SHA512

    1e47a20f44b96ba34c661f88e0b50cbd141b30b377f56e396a221bc7fda294cd80adc43b67db6f3561724657c1ff8b3e62b6a63f964bfeb31036f6dd352a9be2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xl59zT3.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xl59zT3.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe

    Filesize

    423KB

    MD5

    000e235c2a0a726353bda45919a83309

    SHA1

    d2e18efc22379ecb5c3d459fff4436b63a79b9b7

    SHA256

    33fcbef538eb8afb4d60b2ee020008c16e10a3a55003057668ac8772cb819611

    SHA512

    0a5a82a40cdf8470bfd49a62c578a88e1f1c521f75c286303d049447373f1a3d3d284c6529a30d56923f1355ba3cbd571d50e53f3b27f67c835a56c3f07940be

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe

    Filesize

    423KB

    MD5

    000e235c2a0a726353bda45919a83309

    SHA1

    d2e18efc22379ecb5c3d459fff4436b63a79b9b7

    SHA256

    33fcbef538eb8afb4d60b2ee020008c16e10a3a55003057668ac8772cb819611

    SHA512

    0a5a82a40cdf8470bfd49a62c578a88e1f1c521f75c286303d049447373f1a3d3d284c6529a30d56923f1355ba3cbd571d50e53f3b27f67c835a56c3f07940be

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe

    Filesize

    423KB

    MD5

    000e235c2a0a726353bda45919a83309

    SHA1

    d2e18efc22379ecb5c3d459fff4436b63a79b9b7

    SHA256

    33fcbef538eb8afb4d60b2ee020008c16e10a3a55003057668ac8772cb819611

    SHA512

    0a5a82a40cdf8470bfd49a62c578a88e1f1c521f75c286303d049447373f1a3d3d284c6529a30d56923f1355ba3cbd571d50e53f3b27f67c835a56c3f07940be

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe

    Filesize

    423KB

    MD5

    000e235c2a0a726353bda45919a83309

    SHA1

    d2e18efc22379ecb5c3d459fff4436b63a79b9b7

    SHA256

    33fcbef538eb8afb4d60b2ee020008c16e10a3a55003057668ac8772cb819611

    SHA512

    0a5a82a40cdf8470bfd49a62c578a88e1f1c521f75c286303d049447373f1a3d3d284c6529a30d56923f1355ba3cbd571d50e53f3b27f67c835a56c3f07940be

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe

    Filesize

    423KB

    MD5

    000e235c2a0a726353bda45919a83309

    SHA1

    d2e18efc22379ecb5c3d459fff4436b63a79b9b7

    SHA256

    33fcbef538eb8afb4d60b2ee020008c16e10a3a55003057668ac8772cb819611

    SHA512

    0a5a82a40cdf8470bfd49a62c578a88e1f1c521f75c286303d049447373f1a3d3d284c6529a30d56923f1355ba3cbd571d50e53f3b27f67c835a56c3f07940be

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe

    Filesize

    423KB

    MD5

    000e235c2a0a726353bda45919a83309

    SHA1

    d2e18efc22379ecb5c3d459fff4436b63a79b9b7

    SHA256

    33fcbef538eb8afb4d60b2ee020008c16e10a3a55003057668ac8772cb819611

    SHA512

    0a5a82a40cdf8470bfd49a62c578a88e1f1c521f75c286303d049447373f1a3d3d284c6529a30d56923f1355ba3cbd571d50e53f3b27f67c835a56c3f07940be

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2SK7890.exe

    Filesize

    423KB

    MD5

    000e235c2a0a726353bda45919a83309

    SHA1

    d2e18efc22379ecb5c3d459fff4436b63a79b9b7

    SHA256

    33fcbef538eb8afb4d60b2ee020008c16e10a3a55003057668ac8772cb819611

    SHA512

    0a5a82a40cdf8470bfd49a62c578a88e1f1c521f75c286303d049447373f1a3d3d284c6529a30d56923f1355ba3cbd571d50e53f3b27f67c835a56c3f07940be

  • memory/2800-57-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-51-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-63-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-61-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-67-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-65-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-69-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-55-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-53-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-43-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-47-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-49-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-45-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-59-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/2800-40-0x0000000000BE0000-0x0000000000BFE000-memory.dmp

    Filesize

    120KB

  • memory/2800-41-0x0000000000CF0000-0x0000000000D0C000-memory.dmp

    Filesize

    112KB

  • memory/2800-42-0x0000000000CF0000-0x0000000000D06000-memory.dmp

    Filesize

    88KB

  • memory/3000-82-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3000-84-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3000-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/3000-86-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3000-88-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3000-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3000-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3000-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3000-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3000-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB