Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:26

General

  • Target

    32873569a91794a514c03e60b783a21216749c46ada95bcd4730014220a10149_JC.exe

  • Size

    1.1MB

  • MD5

    884b55d7005c869ead2fab88140493d4

  • SHA1

    8c7f02cf14f0dcb23ce26d67b179a5d39444e878

  • SHA256

    32873569a91794a514c03e60b783a21216749c46ada95bcd4730014220a10149

  • SHA512

    d8dd324c7e4f9db428758b6ba3cf2923193377dbd1855396b16139a5e3ce3e03bbd5a160bb913ee3f2a59bc61078c9d5fb5c7c660e775cc784781716e1f7b3e4

  • SSDEEP

    24576:lyfcjZTYh0W5Ozm16xw7V1UzvTYZEqhS0utk:AQY+W5OzmbV6CEqI

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32873569a91794a514c03e60b783a21216749c46ada95bcd4730014220a10149_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\32873569a91794a514c03e60b783a21216749c46ada95bcd4730014220a10149_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kc6YV30.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kc6YV30.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bN3ON68.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bN3ON68.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ve4TZ18.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ve4TZ18.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:936
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1nX14OM9.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1nX14OM9.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2304
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1808
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:580
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 268
                7⤵
                • Program crash
                PID:564
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kc6YV30.exe

    Filesize

    1022KB

    MD5

    fec5a205813cba72c2d154b0028ef7f8

    SHA1

    3e7814372edfc7b327591cc42ecbf19aa0015813

    SHA256

    7006aaafe740071e8a99b3ceb10584a89adb8f4147803f5b2a9ef19ebf7d11ba

    SHA512

    9738d40f59ece18945a61005b2a4a48612e52002c1edc1bc03317c930d038d96df5db2c75b705d8b938290f248c4c8a8daa2b9867557dd51b26b3bde0e0b102f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kc6YV30.exe

    Filesize

    1022KB

    MD5

    fec5a205813cba72c2d154b0028ef7f8

    SHA1

    3e7814372edfc7b327591cc42ecbf19aa0015813

    SHA256

    7006aaafe740071e8a99b3ceb10584a89adb8f4147803f5b2a9ef19ebf7d11ba

    SHA512

    9738d40f59ece18945a61005b2a4a48612e52002c1edc1bc03317c930d038d96df5db2c75b705d8b938290f248c4c8a8daa2b9867557dd51b26b3bde0e0b102f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bN3ON68.exe

    Filesize

    727KB

    MD5

    40505038a1dbcaa933e8a9fee4680cf3

    SHA1

    16e0f7b57d9bd61e8cb79e41310bd7090664336b

    SHA256

    d2e2a8185be3d3d8337d768ec0a9c7d0f2113a572467a8ff48fed8945de80b30

    SHA512

    a98e8d5f6bded5449c432d6728fd8cf470f943b733c92152d601749095192cfae60234ff64420a8c492e503ca3f06f8e5435d82b5a96cc641abc161cf7c0e11e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bN3ON68.exe

    Filesize

    727KB

    MD5

    40505038a1dbcaa933e8a9fee4680cf3

    SHA1

    16e0f7b57d9bd61e8cb79e41310bd7090664336b

    SHA256

    d2e2a8185be3d3d8337d768ec0a9c7d0f2113a572467a8ff48fed8945de80b30

    SHA512

    a98e8d5f6bded5449c432d6728fd8cf470f943b733c92152d601749095192cfae60234ff64420a8c492e503ca3f06f8e5435d82b5a96cc641abc161cf7c0e11e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ve4TZ18.exe

    Filesize

    482KB

    MD5

    1678eec237a6c4d759a6b19fb222a0bc

    SHA1

    a978e4eecb203cfdcfc26e1831f6a220ac530c5a

    SHA256

    e62a1c0de02f72978d2b5a3b4a538bb8522359d5925375d8598f265d359b374b

    SHA512

    fa6b9fb211490ea69f05624923e1c0977881350bc76ce7c63eac0741f2205d0e23cbdf51666d09229e081d41428b48ccf29848c4bc86db4a804505f938ec37bc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ve4TZ18.exe

    Filesize

    482KB

    MD5

    1678eec237a6c4d759a6b19fb222a0bc

    SHA1

    a978e4eecb203cfdcfc26e1831f6a220ac530c5a

    SHA256

    e62a1c0de02f72978d2b5a3b4a538bb8522359d5925375d8598f265d359b374b

    SHA512

    fa6b9fb211490ea69f05624923e1c0977881350bc76ce7c63eac0741f2205d0e23cbdf51666d09229e081d41428b48ccf29848c4bc86db4a804505f938ec37bc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1nX14OM9.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1nX14OM9.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe

    Filesize

    422KB

    MD5

    b5cb9bc0e3031d11a87f09f7dc351603

    SHA1

    043f2cb1c94c44a626f05ddca87122c385da9d60

    SHA256

    24cb9850dd6c2717cb85b98d9fa1037be24f6820dbe5068ece1672501b7b2e2e

    SHA512

    6238d1a03728a3c9c66bccb6d85218c804f2fbb692a14ecf140a2a7a5ad808e31b9368cae3950366fc38aaff7fe62d9acddd07aaefab930b606c90337ef1a549

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe

    Filesize

    422KB

    MD5

    b5cb9bc0e3031d11a87f09f7dc351603

    SHA1

    043f2cb1c94c44a626f05ddca87122c385da9d60

    SHA256

    24cb9850dd6c2717cb85b98d9fa1037be24f6820dbe5068ece1672501b7b2e2e

    SHA512

    6238d1a03728a3c9c66bccb6d85218c804f2fbb692a14ecf140a2a7a5ad808e31b9368cae3950366fc38aaff7fe62d9acddd07aaefab930b606c90337ef1a549

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe

    Filesize

    422KB

    MD5

    b5cb9bc0e3031d11a87f09f7dc351603

    SHA1

    043f2cb1c94c44a626f05ddca87122c385da9d60

    SHA256

    24cb9850dd6c2717cb85b98d9fa1037be24f6820dbe5068ece1672501b7b2e2e

    SHA512

    6238d1a03728a3c9c66bccb6d85218c804f2fbb692a14ecf140a2a7a5ad808e31b9368cae3950366fc38aaff7fe62d9acddd07aaefab930b606c90337ef1a549

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\kc6YV30.exe

    Filesize

    1022KB

    MD5

    fec5a205813cba72c2d154b0028ef7f8

    SHA1

    3e7814372edfc7b327591cc42ecbf19aa0015813

    SHA256

    7006aaafe740071e8a99b3ceb10584a89adb8f4147803f5b2a9ef19ebf7d11ba

    SHA512

    9738d40f59ece18945a61005b2a4a48612e52002c1edc1bc03317c930d038d96df5db2c75b705d8b938290f248c4c8a8daa2b9867557dd51b26b3bde0e0b102f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\kc6YV30.exe

    Filesize

    1022KB

    MD5

    fec5a205813cba72c2d154b0028ef7f8

    SHA1

    3e7814372edfc7b327591cc42ecbf19aa0015813

    SHA256

    7006aaafe740071e8a99b3ceb10584a89adb8f4147803f5b2a9ef19ebf7d11ba

    SHA512

    9738d40f59ece18945a61005b2a4a48612e52002c1edc1bc03317c930d038d96df5db2c75b705d8b938290f248c4c8a8daa2b9867557dd51b26b3bde0e0b102f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\bN3ON68.exe

    Filesize

    727KB

    MD5

    40505038a1dbcaa933e8a9fee4680cf3

    SHA1

    16e0f7b57d9bd61e8cb79e41310bd7090664336b

    SHA256

    d2e2a8185be3d3d8337d768ec0a9c7d0f2113a572467a8ff48fed8945de80b30

    SHA512

    a98e8d5f6bded5449c432d6728fd8cf470f943b733c92152d601749095192cfae60234ff64420a8c492e503ca3f06f8e5435d82b5a96cc641abc161cf7c0e11e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\bN3ON68.exe

    Filesize

    727KB

    MD5

    40505038a1dbcaa933e8a9fee4680cf3

    SHA1

    16e0f7b57d9bd61e8cb79e41310bd7090664336b

    SHA256

    d2e2a8185be3d3d8337d768ec0a9c7d0f2113a572467a8ff48fed8945de80b30

    SHA512

    a98e8d5f6bded5449c432d6728fd8cf470f943b733c92152d601749095192cfae60234ff64420a8c492e503ca3f06f8e5435d82b5a96cc641abc161cf7c0e11e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\ve4TZ18.exe

    Filesize

    482KB

    MD5

    1678eec237a6c4d759a6b19fb222a0bc

    SHA1

    a978e4eecb203cfdcfc26e1831f6a220ac530c5a

    SHA256

    e62a1c0de02f72978d2b5a3b4a538bb8522359d5925375d8598f265d359b374b

    SHA512

    fa6b9fb211490ea69f05624923e1c0977881350bc76ce7c63eac0741f2205d0e23cbdf51666d09229e081d41428b48ccf29848c4bc86db4a804505f938ec37bc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\ve4TZ18.exe

    Filesize

    482KB

    MD5

    1678eec237a6c4d759a6b19fb222a0bc

    SHA1

    a978e4eecb203cfdcfc26e1831f6a220ac530c5a

    SHA256

    e62a1c0de02f72978d2b5a3b4a538bb8522359d5925375d8598f265d359b374b

    SHA512

    fa6b9fb211490ea69f05624923e1c0977881350bc76ce7c63eac0741f2205d0e23cbdf51666d09229e081d41428b48ccf29848c4bc86db4a804505f938ec37bc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1nX14OM9.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1nX14OM9.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe

    Filesize

    422KB

    MD5

    b5cb9bc0e3031d11a87f09f7dc351603

    SHA1

    043f2cb1c94c44a626f05ddca87122c385da9d60

    SHA256

    24cb9850dd6c2717cb85b98d9fa1037be24f6820dbe5068ece1672501b7b2e2e

    SHA512

    6238d1a03728a3c9c66bccb6d85218c804f2fbb692a14ecf140a2a7a5ad808e31b9368cae3950366fc38aaff7fe62d9acddd07aaefab930b606c90337ef1a549

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe

    Filesize

    422KB

    MD5

    b5cb9bc0e3031d11a87f09f7dc351603

    SHA1

    043f2cb1c94c44a626f05ddca87122c385da9d60

    SHA256

    24cb9850dd6c2717cb85b98d9fa1037be24f6820dbe5068ece1672501b7b2e2e

    SHA512

    6238d1a03728a3c9c66bccb6d85218c804f2fbb692a14ecf140a2a7a5ad808e31b9368cae3950366fc38aaff7fe62d9acddd07aaefab930b606c90337ef1a549

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe

    Filesize

    422KB

    MD5

    b5cb9bc0e3031d11a87f09f7dc351603

    SHA1

    043f2cb1c94c44a626f05ddca87122c385da9d60

    SHA256

    24cb9850dd6c2717cb85b98d9fa1037be24f6820dbe5068ece1672501b7b2e2e

    SHA512

    6238d1a03728a3c9c66bccb6d85218c804f2fbb692a14ecf140a2a7a5ad808e31b9368cae3950366fc38aaff7fe62d9acddd07aaefab930b606c90337ef1a549

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe

    Filesize

    422KB

    MD5

    b5cb9bc0e3031d11a87f09f7dc351603

    SHA1

    043f2cb1c94c44a626f05ddca87122c385da9d60

    SHA256

    24cb9850dd6c2717cb85b98d9fa1037be24f6820dbe5068ece1672501b7b2e2e

    SHA512

    6238d1a03728a3c9c66bccb6d85218c804f2fbb692a14ecf140a2a7a5ad808e31b9368cae3950366fc38aaff7fe62d9acddd07aaefab930b606c90337ef1a549

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe

    Filesize

    422KB

    MD5

    b5cb9bc0e3031d11a87f09f7dc351603

    SHA1

    043f2cb1c94c44a626f05ddca87122c385da9d60

    SHA256

    24cb9850dd6c2717cb85b98d9fa1037be24f6820dbe5068ece1672501b7b2e2e

    SHA512

    6238d1a03728a3c9c66bccb6d85218c804f2fbb692a14ecf140a2a7a5ad808e31b9368cae3950366fc38aaff7fe62d9acddd07aaefab930b606c90337ef1a549

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe

    Filesize

    422KB

    MD5

    b5cb9bc0e3031d11a87f09f7dc351603

    SHA1

    043f2cb1c94c44a626f05ddca87122c385da9d60

    SHA256

    24cb9850dd6c2717cb85b98d9fa1037be24f6820dbe5068ece1672501b7b2e2e

    SHA512

    6238d1a03728a3c9c66bccb6d85218c804f2fbb692a14ecf140a2a7a5ad808e31b9368cae3950366fc38aaff7fe62d9acddd07aaefab930b606c90337ef1a549

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lE2215.exe

    Filesize

    422KB

    MD5

    b5cb9bc0e3031d11a87f09f7dc351603

    SHA1

    043f2cb1c94c44a626f05ddca87122c385da9d60

    SHA256

    24cb9850dd6c2717cb85b98d9fa1037be24f6820dbe5068ece1672501b7b2e2e

    SHA512

    6238d1a03728a3c9c66bccb6d85218c804f2fbb692a14ecf140a2a7a5ad808e31b9368cae3950366fc38aaff7fe62d9acddd07aaefab930b606c90337ef1a549

  • memory/580-84-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/580-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/580-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/580-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/580-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/580-82-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/580-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/580-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/580-86-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/580-88-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2304-45-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-40-0x00000000003E0000-0x00000000003FE000-memory.dmp

    Filesize

    120KB

  • memory/2304-49-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-59-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-53-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-43-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-42-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-41-0x0000000000A30000-0x0000000000A4C000-memory.dmp

    Filesize

    112KB

  • memory/2304-51-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-47-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-57-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-55-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-69-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-67-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-65-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-63-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB

  • memory/2304-61-0x0000000000A30000-0x0000000000A46000-memory.dmp

    Filesize

    88KB