Analysis

  • max time kernel
    120s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 18:29

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    1211086d829c57454c98831deb85c63d

  • SHA1

    441456e3bc4f72961d59c43940cb218f546aa255

  • SHA256

    149e02eb51c20a5923c467d13b933f18e75a151d03e4b375935e4180fa6111a2

  • SHA512

    85325cfdb421a2e28990067182e84d4f306136278922fd28636e6480e431c94056b154e82cec67fb00579c9a8a1807d9a3ac58cd0fda9a6063c1a47321f1eca8

  • SSDEEP

    24576:Fyu+g940zJiN+4MU6eHVLm8/PLWPUcpePH8aIeKjYWGQtj0S4S/Tm:gY1JVG6EFWMEe/8KKcWnVGS7

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UA0LZ82.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UA0LZ82.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ow1xg21.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ow1xg21.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vm4LG83.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vm4LG83.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2916
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Br07Jn0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Br07Jn0.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2uP1860.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2uP1860.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2852
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2884
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 268
                7⤵
                • Program crash
                PID:1980
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UA0LZ82.exe

    Filesize

    1.0MB

    MD5

    69cb5bb94b88e974a7a0edbc89c1622f

    SHA1

    8f38f9b8fd143fe1e30b841992eb01d0eb5e7634

    SHA256

    84d6ec2ad5dd43aa75d47417df8d39897d6c824c33bb2c43b1ee3b4927ea7674

    SHA512

    c863d7540e486627bf7e8d26dee16fbafaeb86db2fb5f0cd2b4770b47d25dcb88887baac71edf2a3515034c2045b9a98b8eb58d1e1589cd0f3b9783483e5cdf0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UA0LZ82.exe

    Filesize

    1.0MB

    MD5

    69cb5bb94b88e974a7a0edbc89c1622f

    SHA1

    8f38f9b8fd143fe1e30b841992eb01d0eb5e7634

    SHA256

    84d6ec2ad5dd43aa75d47417df8d39897d6c824c33bb2c43b1ee3b4927ea7674

    SHA512

    c863d7540e486627bf7e8d26dee16fbafaeb86db2fb5f0cd2b4770b47d25dcb88887baac71edf2a3515034c2045b9a98b8eb58d1e1589cd0f3b9783483e5cdf0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ow1xg21.exe

    Filesize

    744KB

    MD5

    a4601387a0d3fb6a307f7ebc2787637d

    SHA1

    0995779621e5e50e16e2d6f1215f2664fb5771b8

    SHA256

    72f6d0551ac2a62ec966ec7ce83e4710a45f78b4fda753a9bb39db15e9ee38dc

    SHA512

    44c9e1ae1f0bf3f859e8b19af1bea3c956904516db4d9b04ff32c3cb91f452b9d0b8ea5ad377b56ab56fca595a6004a14ebe44ad948f235f3b535417a989695c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ow1xg21.exe

    Filesize

    744KB

    MD5

    a4601387a0d3fb6a307f7ebc2787637d

    SHA1

    0995779621e5e50e16e2d6f1215f2664fb5771b8

    SHA256

    72f6d0551ac2a62ec966ec7ce83e4710a45f78b4fda753a9bb39db15e9ee38dc

    SHA512

    44c9e1ae1f0bf3f859e8b19af1bea3c956904516db4d9b04ff32c3cb91f452b9d0b8ea5ad377b56ab56fca595a6004a14ebe44ad948f235f3b535417a989695c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vm4LG83.exe

    Filesize

    493KB

    MD5

    2eb2e0582b5836271f2754da8f4368b8

    SHA1

    ae65d4f1313a2f6a82c8c2e3346855749af94869

    SHA256

    ace9700cf2e1130c6f39018fd1f27e4ea2c1e71949010276d87bf4c3312a4b85

    SHA512

    9bde78e69a9f5366d44545f9c6d22e59dc20b4f8493d19a1af32a1bc2fb3b2747394c5b98a77b3dd22e499e7449ed21db0dcf1a4431a3b16e86eb3fd5acf104e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vm4LG83.exe

    Filesize

    493KB

    MD5

    2eb2e0582b5836271f2754da8f4368b8

    SHA1

    ae65d4f1313a2f6a82c8c2e3346855749af94869

    SHA256

    ace9700cf2e1130c6f39018fd1f27e4ea2c1e71949010276d87bf4c3312a4b85

    SHA512

    9bde78e69a9f5366d44545f9c6d22e59dc20b4f8493d19a1af32a1bc2fb3b2747394c5b98a77b3dd22e499e7449ed21db0dcf1a4431a3b16e86eb3fd5acf104e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Br07Jn0.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Br07Jn0.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2uP1860.exe

    Filesize

    448KB

    MD5

    dec7f8d901c1f59b6a751d16841a3fb0

    SHA1

    6b102d1ee7b5f8c9dd3de4824e4a0877cdd82b13

    SHA256

    9a84451eaff543e5975d6bd605cfa5fe0e7b8f17a1814d0253fc2e4718acc459

    SHA512

    9ff773d6ee86684d830de4c73cfa22c064169f9bcb392fc29111b9b4e110a5c125783b40556c53defef13c68d91ae7b450d8719d0c30e39e95b48637d19861d2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2uP1860.exe

    Filesize

    448KB

    MD5

    dec7f8d901c1f59b6a751d16841a3fb0

    SHA1

    6b102d1ee7b5f8c9dd3de4824e4a0877cdd82b13

    SHA256

    9a84451eaff543e5975d6bd605cfa5fe0e7b8f17a1814d0253fc2e4718acc459

    SHA512

    9ff773d6ee86684d830de4c73cfa22c064169f9bcb392fc29111b9b4e110a5c125783b40556c53defef13c68d91ae7b450d8719d0c30e39e95b48637d19861d2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\UA0LZ82.exe

    Filesize

    1.0MB

    MD5

    69cb5bb94b88e974a7a0edbc89c1622f

    SHA1

    8f38f9b8fd143fe1e30b841992eb01d0eb5e7634

    SHA256

    84d6ec2ad5dd43aa75d47417df8d39897d6c824c33bb2c43b1ee3b4927ea7674

    SHA512

    c863d7540e486627bf7e8d26dee16fbafaeb86db2fb5f0cd2b4770b47d25dcb88887baac71edf2a3515034c2045b9a98b8eb58d1e1589cd0f3b9783483e5cdf0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\UA0LZ82.exe

    Filesize

    1.0MB

    MD5

    69cb5bb94b88e974a7a0edbc89c1622f

    SHA1

    8f38f9b8fd143fe1e30b841992eb01d0eb5e7634

    SHA256

    84d6ec2ad5dd43aa75d47417df8d39897d6c824c33bb2c43b1ee3b4927ea7674

    SHA512

    c863d7540e486627bf7e8d26dee16fbafaeb86db2fb5f0cd2b4770b47d25dcb88887baac71edf2a3515034c2045b9a98b8eb58d1e1589cd0f3b9783483e5cdf0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ow1xg21.exe

    Filesize

    744KB

    MD5

    a4601387a0d3fb6a307f7ebc2787637d

    SHA1

    0995779621e5e50e16e2d6f1215f2664fb5771b8

    SHA256

    72f6d0551ac2a62ec966ec7ce83e4710a45f78b4fda753a9bb39db15e9ee38dc

    SHA512

    44c9e1ae1f0bf3f859e8b19af1bea3c956904516db4d9b04ff32c3cb91f452b9d0b8ea5ad377b56ab56fca595a6004a14ebe44ad948f235f3b535417a989695c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ow1xg21.exe

    Filesize

    744KB

    MD5

    a4601387a0d3fb6a307f7ebc2787637d

    SHA1

    0995779621e5e50e16e2d6f1215f2664fb5771b8

    SHA256

    72f6d0551ac2a62ec966ec7ce83e4710a45f78b4fda753a9bb39db15e9ee38dc

    SHA512

    44c9e1ae1f0bf3f859e8b19af1bea3c956904516db4d9b04ff32c3cb91f452b9d0b8ea5ad377b56ab56fca595a6004a14ebe44ad948f235f3b535417a989695c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Vm4LG83.exe

    Filesize

    493KB

    MD5

    2eb2e0582b5836271f2754da8f4368b8

    SHA1

    ae65d4f1313a2f6a82c8c2e3346855749af94869

    SHA256

    ace9700cf2e1130c6f39018fd1f27e4ea2c1e71949010276d87bf4c3312a4b85

    SHA512

    9bde78e69a9f5366d44545f9c6d22e59dc20b4f8493d19a1af32a1bc2fb3b2747394c5b98a77b3dd22e499e7449ed21db0dcf1a4431a3b16e86eb3fd5acf104e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Vm4LG83.exe

    Filesize

    493KB

    MD5

    2eb2e0582b5836271f2754da8f4368b8

    SHA1

    ae65d4f1313a2f6a82c8c2e3346855749af94869

    SHA256

    ace9700cf2e1130c6f39018fd1f27e4ea2c1e71949010276d87bf4c3312a4b85

    SHA512

    9bde78e69a9f5366d44545f9c6d22e59dc20b4f8493d19a1af32a1bc2fb3b2747394c5b98a77b3dd22e499e7449ed21db0dcf1a4431a3b16e86eb3fd5acf104e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Br07Jn0.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Br07Jn0.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uP1860.exe

    Filesize

    448KB

    MD5

    dec7f8d901c1f59b6a751d16841a3fb0

    SHA1

    6b102d1ee7b5f8c9dd3de4824e4a0877cdd82b13

    SHA256

    9a84451eaff543e5975d6bd605cfa5fe0e7b8f17a1814d0253fc2e4718acc459

    SHA512

    9ff773d6ee86684d830de4c73cfa22c064169f9bcb392fc29111b9b4e110a5c125783b40556c53defef13c68d91ae7b450d8719d0c30e39e95b48637d19861d2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uP1860.exe

    Filesize

    448KB

    MD5

    dec7f8d901c1f59b6a751d16841a3fb0

    SHA1

    6b102d1ee7b5f8c9dd3de4824e4a0877cdd82b13

    SHA256

    9a84451eaff543e5975d6bd605cfa5fe0e7b8f17a1814d0253fc2e4718acc459

    SHA512

    9ff773d6ee86684d830de4c73cfa22c064169f9bcb392fc29111b9b4e110a5c125783b40556c53defef13c68d91ae7b450d8719d0c30e39e95b48637d19861d2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uP1860.exe

    Filesize

    448KB

    MD5

    dec7f8d901c1f59b6a751d16841a3fb0

    SHA1

    6b102d1ee7b5f8c9dd3de4824e4a0877cdd82b13

    SHA256

    9a84451eaff543e5975d6bd605cfa5fe0e7b8f17a1814d0253fc2e4718acc459

    SHA512

    9ff773d6ee86684d830de4c73cfa22c064169f9bcb392fc29111b9b4e110a5c125783b40556c53defef13c68d91ae7b450d8719d0c30e39e95b48637d19861d2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uP1860.exe

    Filesize

    448KB

    MD5

    dec7f8d901c1f59b6a751d16841a3fb0

    SHA1

    6b102d1ee7b5f8c9dd3de4824e4a0877cdd82b13

    SHA256

    9a84451eaff543e5975d6bd605cfa5fe0e7b8f17a1814d0253fc2e4718acc459

    SHA512

    9ff773d6ee86684d830de4c73cfa22c064169f9bcb392fc29111b9b4e110a5c125783b40556c53defef13c68d91ae7b450d8719d0c30e39e95b48637d19861d2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uP1860.exe

    Filesize

    448KB

    MD5

    dec7f8d901c1f59b6a751d16841a3fb0

    SHA1

    6b102d1ee7b5f8c9dd3de4824e4a0877cdd82b13

    SHA256

    9a84451eaff543e5975d6bd605cfa5fe0e7b8f17a1814d0253fc2e4718acc459

    SHA512

    9ff773d6ee86684d830de4c73cfa22c064169f9bcb392fc29111b9b4e110a5c125783b40556c53defef13c68d91ae7b450d8719d0c30e39e95b48637d19861d2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uP1860.exe

    Filesize

    448KB

    MD5

    dec7f8d901c1f59b6a751d16841a3fb0

    SHA1

    6b102d1ee7b5f8c9dd3de4824e4a0877cdd82b13

    SHA256

    9a84451eaff543e5975d6bd605cfa5fe0e7b8f17a1814d0253fc2e4718acc459

    SHA512

    9ff773d6ee86684d830de4c73cfa22c064169f9bcb392fc29111b9b4e110a5c125783b40556c53defef13c68d91ae7b450d8719d0c30e39e95b48637d19861d2

  • memory/2704-42-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-43-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-57-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-59-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-61-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-63-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-65-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-67-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-69-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-53-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-45-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-41-0x00000000020B0000-0x00000000020CC000-memory.dmp

    Filesize

    112KB

  • memory/2704-40-0x00000000003A0000-0x00000000003BE000-memory.dmp

    Filesize

    120KB

  • memory/2704-55-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-47-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-49-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2704-51-0x00000000020B0000-0x00000000020C6000-memory.dmp

    Filesize

    88KB

  • memory/2884-76-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2884-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2884-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2884-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2884-85-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2884-87-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2884-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2884-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2884-78-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2884-77-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB