Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:43

General

  • Target

    722092e91ccd8d91d6ec8018d7f6720d35c47b663302621f6d3e29f67f08eaf6_JC.exe

  • Size

    1.1MB

  • MD5

    2905f9889b1ff599672b829029a3f408

  • SHA1

    d5690fdcb318225dd0f94b8d04368d49e245f547

  • SHA256

    722092e91ccd8d91d6ec8018d7f6720d35c47b663302621f6d3e29f67f08eaf6

  • SHA512

    9b638503a8cfd904744c013fe2184a10b9c6b8681c972c6c0407213a32894574fa3a40ffddbe4ab5395aa14648b172e54e7685c24ada634058aaed4dca47e2d9

  • SSDEEP

    24576:LyCpT2MAB2W9ylepaJ5qczIP2jUJz9v/Oxo+2iM6itAB:+uSB2cylep5b2jUR93OxyVtA

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\722092e91ccd8d91d6ec8018d7f6720d35c47b663302621f6d3e29f67f08eaf6_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\722092e91ccd8d91d6ec8018d7f6720d35c47b663302621f6d3e29f67f08eaf6_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hq8Pq47.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hq8Pq47.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sa1mW19.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sa1mW19.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hs6Pc29.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hs6Pc29.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3036
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Um73QO6.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Um73QO6.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2608
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2568
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 268
                7⤵
                • Program crash
                PID:2476
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hq8Pq47.exe

    Filesize

    1021KB

    MD5

    aab80dccecd5ef0ac984dba85320bb49

    SHA1

    4130971e4f4560b658ebc3a53ea487a593029f92

    SHA256

    aa36fdf57c948f3142eb61914eaefafbb174f8b4efa4d4e405b726160cfc1b4e

    SHA512

    0f8f1fc305f7b4615a471b0be8f931b821da55d0e6b1647fd59b34a3a554e8648678a9c595939ccf4cc8345b4d46f5a0df49d11506331fe844d3490286a66a09

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hq8Pq47.exe

    Filesize

    1021KB

    MD5

    aab80dccecd5ef0ac984dba85320bb49

    SHA1

    4130971e4f4560b658ebc3a53ea487a593029f92

    SHA256

    aa36fdf57c948f3142eb61914eaefafbb174f8b4efa4d4e405b726160cfc1b4e

    SHA512

    0f8f1fc305f7b4615a471b0be8f931b821da55d0e6b1647fd59b34a3a554e8648678a9c595939ccf4cc8345b4d46f5a0df49d11506331fe844d3490286a66a09

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sa1mW19.exe

    Filesize

    725KB

    MD5

    41bff7e42c8a24b8ca12f5efe320b5bf

    SHA1

    5d975cd90ba06ecd0cb0a7008beede872ec70ec8

    SHA256

    fbb7dcbf3b417b4403b2a3989e3870cfef8a44a9a46189e7ade1c95e63bb07af

    SHA512

    c9d830ce3e8cbb8c870bd55cf193d73dfd1f9b5964ffd84e195b3145fd06edd6d6c0de4a21936735158c3deebab5965e97ef151ad5dae784dee71eb6ea8c0a7c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sa1mW19.exe

    Filesize

    725KB

    MD5

    41bff7e42c8a24b8ca12f5efe320b5bf

    SHA1

    5d975cd90ba06ecd0cb0a7008beede872ec70ec8

    SHA256

    fbb7dcbf3b417b4403b2a3989e3870cfef8a44a9a46189e7ade1c95e63bb07af

    SHA512

    c9d830ce3e8cbb8c870bd55cf193d73dfd1f9b5964ffd84e195b3145fd06edd6d6c0de4a21936735158c3deebab5965e97ef151ad5dae784dee71eb6ea8c0a7c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hs6Pc29.exe

    Filesize

    479KB

    MD5

    01a27fb2d250db8790b7665b1c4f0a2e

    SHA1

    2e9f480f01392b35703f60fcec214df7d7132269

    SHA256

    bce8e2f5492b4d7ae19b035f933e1d0e7d764321a4e11c3a8da0301d529af6f7

    SHA512

    f2c0afeac2c7539efcf6229660e956ad51fe28b7230b396734cc095c0d653e78f863acc955983cad704e2a1ee07099e5b25810e26f442fb7260b6586f8c147c4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hs6Pc29.exe

    Filesize

    479KB

    MD5

    01a27fb2d250db8790b7665b1c4f0a2e

    SHA1

    2e9f480f01392b35703f60fcec214df7d7132269

    SHA256

    bce8e2f5492b4d7ae19b035f933e1d0e7d764321a4e11c3a8da0301d529af6f7

    SHA512

    f2c0afeac2c7539efcf6229660e956ad51fe28b7230b396734cc095c0d653e78f863acc955983cad704e2a1ee07099e5b25810e26f442fb7260b6586f8c147c4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Um73QO6.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Um73QO6.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe

    Filesize

    423KB

    MD5

    89e17d066778a9e0c468e4315fae78df

    SHA1

    de907661432e5a5894499382e3e788e65169176e

    SHA256

    6031a144a718fdbe34bef57f6af7f12499bef6cc3dc7a65ecc4a93ae48411190

    SHA512

    f285e222591fc032262b375e97780a1cbde7bfb4c79831d25e049e5cb9e375a1841437e927b48628322619e2e5fcef421154616f4e022344dfaba480b2b4bc27

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe

    Filesize

    423KB

    MD5

    89e17d066778a9e0c468e4315fae78df

    SHA1

    de907661432e5a5894499382e3e788e65169176e

    SHA256

    6031a144a718fdbe34bef57f6af7f12499bef6cc3dc7a65ecc4a93ae48411190

    SHA512

    f285e222591fc032262b375e97780a1cbde7bfb4c79831d25e049e5cb9e375a1841437e927b48628322619e2e5fcef421154616f4e022344dfaba480b2b4bc27

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe

    Filesize

    423KB

    MD5

    89e17d066778a9e0c468e4315fae78df

    SHA1

    de907661432e5a5894499382e3e788e65169176e

    SHA256

    6031a144a718fdbe34bef57f6af7f12499bef6cc3dc7a65ecc4a93ae48411190

    SHA512

    f285e222591fc032262b375e97780a1cbde7bfb4c79831d25e049e5cb9e375a1841437e927b48628322619e2e5fcef421154616f4e022344dfaba480b2b4bc27

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\hq8Pq47.exe

    Filesize

    1021KB

    MD5

    aab80dccecd5ef0ac984dba85320bb49

    SHA1

    4130971e4f4560b658ebc3a53ea487a593029f92

    SHA256

    aa36fdf57c948f3142eb61914eaefafbb174f8b4efa4d4e405b726160cfc1b4e

    SHA512

    0f8f1fc305f7b4615a471b0be8f931b821da55d0e6b1647fd59b34a3a554e8648678a9c595939ccf4cc8345b4d46f5a0df49d11506331fe844d3490286a66a09

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\hq8Pq47.exe

    Filesize

    1021KB

    MD5

    aab80dccecd5ef0ac984dba85320bb49

    SHA1

    4130971e4f4560b658ebc3a53ea487a593029f92

    SHA256

    aa36fdf57c948f3142eb61914eaefafbb174f8b4efa4d4e405b726160cfc1b4e

    SHA512

    0f8f1fc305f7b4615a471b0be8f931b821da55d0e6b1647fd59b34a3a554e8648678a9c595939ccf4cc8345b4d46f5a0df49d11506331fe844d3490286a66a09

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Sa1mW19.exe

    Filesize

    725KB

    MD5

    41bff7e42c8a24b8ca12f5efe320b5bf

    SHA1

    5d975cd90ba06ecd0cb0a7008beede872ec70ec8

    SHA256

    fbb7dcbf3b417b4403b2a3989e3870cfef8a44a9a46189e7ade1c95e63bb07af

    SHA512

    c9d830ce3e8cbb8c870bd55cf193d73dfd1f9b5964ffd84e195b3145fd06edd6d6c0de4a21936735158c3deebab5965e97ef151ad5dae784dee71eb6ea8c0a7c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Sa1mW19.exe

    Filesize

    725KB

    MD5

    41bff7e42c8a24b8ca12f5efe320b5bf

    SHA1

    5d975cd90ba06ecd0cb0a7008beede872ec70ec8

    SHA256

    fbb7dcbf3b417b4403b2a3989e3870cfef8a44a9a46189e7ade1c95e63bb07af

    SHA512

    c9d830ce3e8cbb8c870bd55cf193d73dfd1f9b5964ffd84e195b3145fd06edd6d6c0de4a21936735158c3deebab5965e97ef151ad5dae784dee71eb6ea8c0a7c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Hs6Pc29.exe

    Filesize

    479KB

    MD5

    01a27fb2d250db8790b7665b1c4f0a2e

    SHA1

    2e9f480f01392b35703f60fcec214df7d7132269

    SHA256

    bce8e2f5492b4d7ae19b035f933e1d0e7d764321a4e11c3a8da0301d529af6f7

    SHA512

    f2c0afeac2c7539efcf6229660e956ad51fe28b7230b396734cc095c0d653e78f863acc955983cad704e2a1ee07099e5b25810e26f442fb7260b6586f8c147c4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Hs6Pc29.exe

    Filesize

    479KB

    MD5

    01a27fb2d250db8790b7665b1c4f0a2e

    SHA1

    2e9f480f01392b35703f60fcec214df7d7132269

    SHA256

    bce8e2f5492b4d7ae19b035f933e1d0e7d764321a4e11c3a8da0301d529af6f7

    SHA512

    f2c0afeac2c7539efcf6229660e956ad51fe28b7230b396734cc095c0d653e78f863acc955983cad704e2a1ee07099e5b25810e26f442fb7260b6586f8c147c4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Um73QO6.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Um73QO6.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe

    Filesize

    423KB

    MD5

    89e17d066778a9e0c468e4315fae78df

    SHA1

    de907661432e5a5894499382e3e788e65169176e

    SHA256

    6031a144a718fdbe34bef57f6af7f12499bef6cc3dc7a65ecc4a93ae48411190

    SHA512

    f285e222591fc032262b375e97780a1cbde7bfb4c79831d25e049e5cb9e375a1841437e927b48628322619e2e5fcef421154616f4e022344dfaba480b2b4bc27

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe

    Filesize

    423KB

    MD5

    89e17d066778a9e0c468e4315fae78df

    SHA1

    de907661432e5a5894499382e3e788e65169176e

    SHA256

    6031a144a718fdbe34bef57f6af7f12499bef6cc3dc7a65ecc4a93ae48411190

    SHA512

    f285e222591fc032262b375e97780a1cbde7bfb4c79831d25e049e5cb9e375a1841437e927b48628322619e2e5fcef421154616f4e022344dfaba480b2b4bc27

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe

    Filesize

    423KB

    MD5

    89e17d066778a9e0c468e4315fae78df

    SHA1

    de907661432e5a5894499382e3e788e65169176e

    SHA256

    6031a144a718fdbe34bef57f6af7f12499bef6cc3dc7a65ecc4a93ae48411190

    SHA512

    f285e222591fc032262b375e97780a1cbde7bfb4c79831d25e049e5cb9e375a1841437e927b48628322619e2e5fcef421154616f4e022344dfaba480b2b4bc27

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe

    Filesize

    423KB

    MD5

    89e17d066778a9e0c468e4315fae78df

    SHA1

    de907661432e5a5894499382e3e788e65169176e

    SHA256

    6031a144a718fdbe34bef57f6af7f12499bef6cc3dc7a65ecc4a93ae48411190

    SHA512

    f285e222591fc032262b375e97780a1cbde7bfb4c79831d25e049e5cb9e375a1841437e927b48628322619e2e5fcef421154616f4e022344dfaba480b2b4bc27

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe

    Filesize

    423KB

    MD5

    89e17d066778a9e0c468e4315fae78df

    SHA1

    de907661432e5a5894499382e3e788e65169176e

    SHA256

    6031a144a718fdbe34bef57f6af7f12499bef6cc3dc7a65ecc4a93ae48411190

    SHA512

    f285e222591fc032262b375e97780a1cbde7bfb4c79831d25e049e5cb9e375a1841437e927b48628322619e2e5fcef421154616f4e022344dfaba480b2b4bc27

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe

    Filesize

    423KB

    MD5

    89e17d066778a9e0c468e4315fae78df

    SHA1

    de907661432e5a5894499382e3e788e65169176e

    SHA256

    6031a144a718fdbe34bef57f6af7f12499bef6cc3dc7a65ecc4a93ae48411190

    SHA512

    f285e222591fc032262b375e97780a1cbde7bfb4c79831d25e049e5cb9e375a1841437e927b48628322619e2e5fcef421154616f4e022344dfaba480b2b4bc27

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2sO5693.exe

    Filesize

    423KB

    MD5

    89e17d066778a9e0c468e4315fae78df

    SHA1

    de907661432e5a5894499382e3e788e65169176e

    SHA256

    6031a144a718fdbe34bef57f6af7f12499bef6cc3dc7a65ecc4a93ae48411190

    SHA512

    f285e222591fc032262b375e97780a1cbde7bfb4c79831d25e049e5cb9e375a1841437e927b48628322619e2e5fcef421154616f4e022344dfaba480b2b4bc27

  • memory/2568-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2568-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2568-92-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2568-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2568-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2568-85-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2568-88-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2568-87-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2568-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2568-82-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2640-67-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-55-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-47-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-45-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-53-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-63-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-69-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-65-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-51-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-49-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-57-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-59-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-61-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-43-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-42-0x00000000009F0000-0x0000000000A06000-memory.dmp

    Filesize

    88KB

  • memory/2640-41-0x00000000009F0000-0x0000000000A0C000-memory.dmp

    Filesize

    112KB

  • memory/2640-40-0x00000000003D0000-0x00000000003EE000-memory.dmp

    Filesize

    120KB