Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:34

General

  • Target

    4f6c04cde1ee067e6ec58153e325b0df3d59ffdde47adf2e5784373cefdc0279_JC.exe

  • Size

    1.1MB

  • MD5

    5cc089dfc039fc97841728414623d887

  • SHA1

    2e75f512c142b4fa7ed5006d42864206da10c64f

  • SHA256

    4f6c04cde1ee067e6ec58153e325b0df3d59ffdde47adf2e5784373cefdc0279

  • SHA512

    c2071b4f63f26465fed05c9a6b6def2e17097f1a828c21878eb35ea52137537c67410363b0ab2ad9eb3a2779ed2fcf992d8e5afc21c117079fb2012cc5abf77f

  • SSDEEP

    24576:gyvdOGMeavvqj6hlWaoHx/NkQKwkM/sDCeCWoO9fj2:nv+eqv+6hlWaOx/Nk1G/suuJ

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f6c04cde1ee067e6ec58153e325b0df3d59ffdde47adf2e5784373cefdc0279_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\4f6c04cde1ee067e6ec58153e325b0df3d59ffdde47adf2e5784373cefdc0279_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wg8VZ86.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wg8VZ86.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PA3Fe21.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PA3Fe21.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iv9aj13.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iv9aj13.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pN31qS7.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pN31qS7.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2552
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2380
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:584
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 268
                7⤵
                • Program crash
                PID:388
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wg8VZ86.exe

    Filesize

    1020KB

    MD5

    f162538d67f035ffb79e51cac89b3e43

    SHA1

    6e2fa630d6beb07613518e4aaffbd631acccfd03

    SHA256

    1783dea27ef692dd5af5fde306b1489e5a6c24c9cb13f4aed1580405989c6dd2

    SHA512

    6194c0989e7b9289ebb8ffe0b9a063730259ceaa7027bcb8b4150bf0bddf72223c17e1f0613b7164c9563c2b74560a210e4f6aae36849a472605fed92bc45d9f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wg8VZ86.exe

    Filesize

    1020KB

    MD5

    f162538d67f035ffb79e51cac89b3e43

    SHA1

    6e2fa630d6beb07613518e4aaffbd631acccfd03

    SHA256

    1783dea27ef692dd5af5fde306b1489e5a6c24c9cb13f4aed1580405989c6dd2

    SHA512

    6194c0989e7b9289ebb8ffe0b9a063730259ceaa7027bcb8b4150bf0bddf72223c17e1f0613b7164c9563c2b74560a210e4f6aae36849a472605fed92bc45d9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PA3Fe21.exe

    Filesize

    725KB

    MD5

    da1e80c77e178b0a5dfba1214d173fd3

    SHA1

    35cc7faa9a13bc3694050f699ce92d12a265d705

    SHA256

    7a6263c8ca03af97ccbd4d22c04979f793839528378ebf03ddc7f9ffb445632c

    SHA512

    7b6a3625ee3333fa2fb3476417e72b85f1c2df33c0718ea9055f0c6e82a5bcc0f47866a688523dcf9042567f08aebec0f24ad8dc2ac89ffc29aa90d6fe7f91bd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PA3Fe21.exe

    Filesize

    725KB

    MD5

    da1e80c77e178b0a5dfba1214d173fd3

    SHA1

    35cc7faa9a13bc3694050f699ce92d12a265d705

    SHA256

    7a6263c8ca03af97ccbd4d22c04979f793839528378ebf03ddc7f9ffb445632c

    SHA512

    7b6a3625ee3333fa2fb3476417e72b85f1c2df33c0718ea9055f0c6e82a5bcc0f47866a688523dcf9042567f08aebec0f24ad8dc2ac89ffc29aa90d6fe7f91bd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iv9aj13.exe

    Filesize

    479KB

    MD5

    5156fd9a0d01278d7da408b6a68b6ffe

    SHA1

    bc07494c31c163f8a7b24b4922d8c9e1dea5243a

    SHA256

    cee47c7d600c51351e4c29d330d9c590a2f87b14444157d538b378bb37ca5fcb

    SHA512

    0368f9d30b91b3396c4a8140e69178615778264fc01e30859676cb0fff64927cfb4972b78ee7a07c01cf5ce605957fd72643b8c136e308e4976f4246b90f8075

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iv9aj13.exe

    Filesize

    479KB

    MD5

    5156fd9a0d01278d7da408b6a68b6ffe

    SHA1

    bc07494c31c163f8a7b24b4922d8c9e1dea5243a

    SHA256

    cee47c7d600c51351e4c29d330d9c590a2f87b14444157d538b378bb37ca5fcb

    SHA512

    0368f9d30b91b3396c4a8140e69178615778264fc01e30859676cb0fff64927cfb4972b78ee7a07c01cf5ce605957fd72643b8c136e308e4976f4246b90f8075

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pN31qS7.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pN31qS7.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe

    Filesize

    423KB

    MD5

    05074f43ced77e719f6c09a8e2fa48b1

    SHA1

    99a6c1a0c2d269bd49da13352b9147980e525ef0

    SHA256

    ad1d22409d87d9a5db2a593a9b05114bfab14a30aeea69b19f5934e59318857b

    SHA512

    add138677ecc321e81cde9f2f41d422fc86ef1fc7c753e4f589170d18b7e2289ba8d2ebcc8d43e4244da87682dc3fff11f4e834c287955bcc7ad3425e29b957f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe

    Filesize

    423KB

    MD5

    05074f43ced77e719f6c09a8e2fa48b1

    SHA1

    99a6c1a0c2d269bd49da13352b9147980e525ef0

    SHA256

    ad1d22409d87d9a5db2a593a9b05114bfab14a30aeea69b19f5934e59318857b

    SHA512

    add138677ecc321e81cde9f2f41d422fc86ef1fc7c753e4f589170d18b7e2289ba8d2ebcc8d43e4244da87682dc3fff11f4e834c287955bcc7ad3425e29b957f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe

    Filesize

    423KB

    MD5

    05074f43ced77e719f6c09a8e2fa48b1

    SHA1

    99a6c1a0c2d269bd49da13352b9147980e525ef0

    SHA256

    ad1d22409d87d9a5db2a593a9b05114bfab14a30aeea69b19f5934e59318857b

    SHA512

    add138677ecc321e81cde9f2f41d422fc86ef1fc7c753e4f589170d18b7e2289ba8d2ebcc8d43e4244da87682dc3fff11f4e834c287955bcc7ad3425e29b957f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\wg8VZ86.exe

    Filesize

    1020KB

    MD5

    f162538d67f035ffb79e51cac89b3e43

    SHA1

    6e2fa630d6beb07613518e4aaffbd631acccfd03

    SHA256

    1783dea27ef692dd5af5fde306b1489e5a6c24c9cb13f4aed1580405989c6dd2

    SHA512

    6194c0989e7b9289ebb8ffe0b9a063730259ceaa7027bcb8b4150bf0bddf72223c17e1f0613b7164c9563c2b74560a210e4f6aae36849a472605fed92bc45d9f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\wg8VZ86.exe

    Filesize

    1020KB

    MD5

    f162538d67f035ffb79e51cac89b3e43

    SHA1

    6e2fa630d6beb07613518e4aaffbd631acccfd03

    SHA256

    1783dea27ef692dd5af5fde306b1489e5a6c24c9cb13f4aed1580405989c6dd2

    SHA512

    6194c0989e7b9289ebb8ffe0b9a063730259ceaa7027bcb8b4150bf0bddf72223c17e1f0613b7164c9563c2b74560a210e4f6aae36849a472605fed92bc45d9f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\PA3Fe21.exe

    Filesize

    725KB

    MD5

    da1e80c77e178b0a5dfba1214d173fd3

    SHA1

    35cc7faa9a13bc3694050f699ce92d12a265d705

    SHA256

    7a6263c8ca03af97ccbd4d22c04979f793839528378ebf03ddc7f9ffb445632c

    SHA512

    7b6a3625ee3333fa2fb3476417e72b85f1c2df33c0718ea9055f0c6e82a5bcc0f47866a688523dcf9042567f08aebec0f24ad8dc2ac89ffc29aa90d6fe7f91bd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\PA3Fe21.exe

    Filesize

    725KB

    MD5

    da1e80c77e178b0a5dfba1214d173fd3

    SHA1

    35cc7faa9a13bc3694050f699ce92d12a265d705

    SHA256

    7a6263c8ca03af97ccbd4d22c04979f793839528378ebf03ddc7f9ffb445632c

    SHA512

    7b6a3625ee3333fa2fb3476417e72b85f1c2df33c0718ea9055f0c6e82a5bcc0f47866a688523dcf9042567f08aebec0f24ad8dc2ac89ffc29aa90d6fe7f91bd

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\iv9aj13.exe

    Filesize

    479KB

    MD5

    5156fd9a0d01278d7da408b6a68b6ffe

    SHA1

    bc07494c31c163f8a7b24b4922d8c9e1dea5243a

    SHA256

    cee47c7d600c51351e4c29d330d9c590a2f87b14444157d538b378bb37ca5fcb

    SHA512

    0368f9d30b91b3396c4a8140e69178615778264fc01e30859676cb0fff64927cfb4972b78ee7a07c01cf5ce605957fd72643b8c136e308e4976f4246b90f8075

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\iv9aj13.exe

    Filesize

    479KB

    MD5

    5156fd9a0d01278d7da408b6a68b6ffe

    SHA1

    bc07494c31c163f8a7b24b4922d8c9e1dea5243a

    SHA256

    cee47c7d600c51351e4c29d330d9c590a2f87b14444157d538b378bb37ca5fcb

    SHA512

    0368f9d30b91b3396c4a8140e69178615778264fc01e30859676cb0fff64927cfb4972b78ee7a07c01cf5ce605957fd72643b8c136e308e4976f4246b90f8075

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1pN31qS7.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1pN31qS7.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe

    Filesize

    423KB

    MD5

    05074f43ced77e719f6c09a8e2fa48b1

    SHA1

    99a6c1a0c2d269bd49da13352b9147980e525ef0

    SHA256

    ad1d22409d87d9a5db2a593a9b05114bfab14a30aeea69b19f5934e59318857b

    SHA512

    add138677ecc321e81cde9f2f41d422fc86ef1fc7c753e4f589170d18b7e2289ba8d2ebcc8d43e4244da87682dc3fff11f4e834c287955bcc7ad3425e29b957f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe

    Filesize

    423KB

    MD5

    05074f43ced77e719f6c09a8e2fa48b1

    SHA1

    99a6c1a0c2d269bd49da13352b9147980e525ef0

    SHA256

    ad1d22409d87d9a5db2a593a9b05114bfab14a30aeea69b19f5934e59318857b

    SHA512

    add138677ecc321e81cde9f2f41d422fc86ef1fc7c753e4f589170d18b7e2289ba8d2ebcc8d43e4244da87682dc3fff11f4e834c287955bcc7ad3425e29b957f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe

    Filesize

    423KB

    MD5

    05074f43ced77e719f6c09a8e2fa48b1

    SHA1

    99a6c1a0c2d269bd49da13352b9147980e525ef0

    SHA256

    ad1d22409d87d9a5db2a593a9b05114bfab14a30aeea69b19f5934e59318857b

    SHA512

    add138677ecc321e81cde9f2f41d422fc86ef1fc7c753e4f589170d18b7e2289ba8d2ebcc8d43e4244da87682dc3fff11f4e834c287955bcc7ad3425e29b957f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe

    Filesize

    423KB

    MD5

    05074f43ced77e719f6c09a8e2fa48b1

    SHA1

    99a6c1a0c2d269bd49da13352b9147980e525ef0

    SHA256

    ad1d22409d87d9a5db2a593a9b05114bfab14a30aeea69b19f5934e59318857b

    SHA512

    add138677ecc321e81cde9f2f41d422fc86ef1fc7c753e4f589170d18b7e2289ba8d2ebcc8d43e4244da87682dc3fff11f4e834c287955bcc7ad3425e29b957f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe

    Filesize

    423KB

    MD5

    05074f43ced77e719f6c09a8e2fa48b1

    SHA1

    99a6c1a0c2d269bd49da13352b9147980e525ef0

    SHA256

    ad1d22409d87d9a5db2a593a9b05114bfab14a30aeea69b19f5934e59318857b

    SHA512

    add138677ecc321e81cde9f2f41d422fc86ef1fc7c753e4f589170d18b7e2289ba8d2ebcc8d43e4244da87682dc3fff11f4e834c287955bcc7ad3425e29b957f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe

    Filesize

    423KB

    MD5

    05074f43ced77e719f6c09a8e2fa48b1

    SHA1

    99a6c1a0c2d269bd49da13352b9147980e525ef0

    SHA256

    ad1d22409d87d9a5db2a593a9b05114bfab14a30aeea69b19f5934e59318857b

    SHA512

    add138677ecc321e81cde9f2f41d422fc86ef1fc7c753e4f589170d18b7e2289ba8d2ebcc8d43e4244da87682dc3fff11f4e834c287955bcc7ad3425e29b957f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2am6676.exe

    Filesize

    423KB

    MD5

    05074f43ced77e719f6c09a8e2fa48b1

    SHA1

    99a6c1a0c2d269bd49da13352b9147980e525ef0

    SHA256

    ad1d22409d87d9a5db2a593a9b05114bfab14a30aeea69b19f5934e59318857b

    SHA512

    add138677ecc321e81cde9f2f41d422fc86ef1fc7c753e4f589170d18b7e2289ba8d2ebcc8d43e4244da87682dc3fff11f4e834c287955bcc7ad3425e29b957f

  • memory/584-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/584-82-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/584-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/584-88-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/584-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/584-86-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/584-84-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/584-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/584-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/584-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2552-57-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-69-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-49-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-45-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-53-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-51-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-55-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-59-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-67-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-47-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-63-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-65-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-61-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-43-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-42-0x00000000020D0000-0x00000000020E6000-memory.dmp

    Filesize

    88KB

  • memory/2552-41-0x00000000020D0000-0x00000000020EC000-memory.dmp

    Filesize

    112KB

  • memory/2552-40-0x0000000001F90000-0x0000000001FAE000-memory.dmp

    Filesize

    120KB