Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:48

General

  • Target

    7dbc6db036589ac9fe959e7856e06f2bc63dff365b2c4154434e959819af0358_JC.exe

  • Size

    1.1MB

  • MD5

    65d355f91a2a5a1c6a0c8eb743ed0f0e

  • SHA1

    2d9f2a83d2bcbcfd2684e761b736ac2de5d59ce3

  • SHA256

    7dbc6db036589ac9fe959e7856e06f2bc63dff365b2c4154434e959819af0358

  • SHA512

    7eb8ce3a31e51b49ab32112a01e19fb70356543382c014778206b9768d91a74c5b8960cf7b340c52cbc73b93c6e46684994e249141c67b8a9f1697a0fcc98ff1

  • SSDEEP

    24576:pyFkvKITMj+H/PGTr80bU1QjcfwmmG4g7NpfYVX6:cFkCITcEYrrU1DwmmGjNKVX

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7dbc6db036589ac9fe959e7856e06f2bc63dff365b2c4154434e959819af0358_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\7dbc6db036589ac9fe959e7856e06f2bc63dff365b2c4154434e959819af0358_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rI5aK64.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rI5aK64.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ep4es16.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ep4es16.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qo3Gb86.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qo3Gb86.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3064
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dn66nn9.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dn66nn9.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2736
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2308
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:436
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 268
                7⤵
                • Program crash
                PID:1452
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rI5aK64.exe

    Filesize

    1022KB

    MD5

    5ad001aec07b462bd041024d559c0ecb

    SHA1

    5945febdf59aa0a60b2ad084e85ede6716bf94f2

    SHA256

    fcd65cf2811e91e87e25dbf5ba09cf94b4a60a9191fd58c3b392fb71eb6d88ad

    SHA512

    e962f27fcf58a01bbae5990495e0cb36eb125e8ef2e614f10febbd119bcac009b6ae30d54d3d4cb3bf981aced392d4c394a83ccb08cf7bf1c0a1ca7222e37544

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rI5aK64.exe

    Filesize

    1022KB

    MD5

    5ad001aec07b462bd041024d559c0ecb

    SHA1

    5945febdf59aa0a60b2ad084e85ede6716bf94f2

    SHA256

    fcd65cf2811e91e87e25dbf5ba09cf94b4a60a9191fd58c3b392fb71eb6d88ad

    SHA512

    e962f27fcf58a01bbae5990495e0cb36eb125e8ef2e614f10febbd119bcac009b6ae30d54d3d4cb3bf981aced392d4c394a83ccb08cf7bf1c0a1ca7222e37544

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ep4es16.exe

    Filesize

    727KB

    MD5

    b9696dd0013fca30faa5e2b7b838f532

    SHA1

    cace2853dae605619c3e2c996f501a32fbe315c8

    SHA256

    ffb410282d9e57b3f3d562eebc798b76762c8f58617216a756f97fbc20680b53

    SHA512

    ee918430861f35a9016806bae09cf69f05cfe899e22f921fe90a75c130f4199f1fde12490fbaeffeb50c561733db56a1bf783f268a9e595bc23998b13ec36d7c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ep4es16.exe

    Filesize

    727KB

    MD5

    b9696dd0013fca30faa5e2b7b838f532

    SHA1

    cace2853dae605619c3e2c996f501a32fbe315c8

    SHA256

    ffb410282d9e57b3f3d562eebc798b76762c8f58617216a756f97fbc20680b53

    SHA512

    ee918430861f35a9016806bae09cf69f05cfe899e22f921fe90a75c130f4199f1fde12490fbaeffeb50c561733db56a1bf783f268a9e595bc23998b13ec36d7c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qo3Gb86.exe

    Filesize

    482KB

    MD5

    6cf5e6510366a411baea1903f9a1d156

    SHA1

    b6d3f05ea3433d84aea17f726dd7883379cf6a8e

    SHA256

    b91670545def5a9f1cd332ebf5cf353e78a4d3ac7db624b2958e4e7d89e89588

    SHA512

    015d556211661f5e6b8e224d9d299dc032f87d3b360d8e6fc7171e0f7f6868cb8881405aaf60ec8f87c132eee41543b4f93e9197020345f11001668a449e1874

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qo3Gb86.exe

    Filesize

    482KB

    MD5

    6cf5e6510366a411baea1903f9a1d156

    SHA1

    b6d3f05ea3433d84aea17f726dd7883379cf6a8e

    SHA256

    b91670545def5a9f1cd332ebf5cf353e78a4d3ac7db624b2958e4e7d89e89588

    SHA512

    015d556211661f5e6b8e224d9d299dc032f87d3b360d8e6fc7171e0f7f6868cb8881405aaf60ec8f87c132eee41543b4f93e9197020345f11001668a449e1874

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dn66nn9.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dn66nn9.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe

    Filesize

    422KB

    MD5

    fdd20a849b0f01f2a94e505e8b65c2ab

    SHA1

    30ad3445c354f18e10cadf5b5a322599d1b4d475

    SHA256

    fcf7fbf3cada795f72b39a872d1534d6dafb1707938cb40214dce4c46063a38c

    SHA512

    2208a7f543beb47e145bbeb02ab2a723421dd22744074f1a0b7ec21a16efb408bd7a008e8b667dfc8fd2941e6bf7b95df55646288c6e93a651d8fc152b247604

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe

    Filesize

    422KB

    MD5

    fdd20a849b0f01f2a94e505e8b65c2ab

    SHA1

    30ad3445c354f18e10cadf5b5a322599d1b4d475

    SHA256

    fcf7fbf3cada795f72b39a872d1534d6dafb1707938cb40214dce4c46063a38c

    SHA512

    2208a7f543beb47e145bbeb02ab2a723421dd22744074f1a0b7ec21a16efb408bd7a008e8b667dfc8fd2941e6bf7b95df55646288c6e93a651d8fc152b247604

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe

    Filesize

    422KB

    MD5

    fdd20a849b0f01f2a94e505e8b65c2ab

    SHA1

    30ad3445c354f18e10cadf5b5a322599d1b4d475

    SHA256

    fcf7fbf3cada795f72b39a872d1534d6dafb1707938cb40214dce4c46063a38c

    SHA512

    2208a7f543beb47e145bbeb02ab2a723421dd22744074f1a0b7ec21a16efb408bd7a008e8b667dfc8fd2941e6bf7b95df55646288c6e93a651d8fc152b247604

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\rI5aK64.exe

    Filesize

    1022KB

    MD5

    5ad001aec07b462bd041024d559c0ecb

    SHA1

    5945febdf59aa0a60b2ad084e85ede6716bf94f2

    SHA256

    fcd65cf2811e91e87e25dbf5ba09cf94b4a60a9191fd58c3b392fb71eb6d88ad

    SHA512

    e962f27fcf58a01bbae5990495e0cb36eb125e8ef2e614f10febbd119bcac009b6ae30d54d3d4cb3bf981aced392d4c394a83ccb08cf7bf1c0a1ca7222e37544

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\rI5aK64.exe

    Filesize

    1022KB

    MD5

    5ad001aec07b462bd041024d559c0ecb

    SHA1

    5945febdf59aa0a60b2ad084e85ede6716bf94f2

    SHA256

    fcd65cf2811e91e87e25dbf5ba09cf94b4a60a9191fd58c3b392fb71eb6d88ad

    SHA512

    e962f27fcf58a01bbae5990495e0cb36eb125e8ef2e614f10febbd119bcac009b6ae30d54d3d4cb3bf981aced392d4c394a83ccb08cf7bf1c0a1ca7222e37544

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Ep4es16.exe

    Filesize

    727KB

    MD5

    b9696dd0013fca30faa5e2b7b838f532

    SHA1

    cace2853dae605619c3e2c996f501a32fbe315c8

    SHA256

    ffb410282d9e57b3f3d562eebc798b76762c8f58617216a756f97fbc20680b53

    SHA512

    ee918430861f35a9016806bae09cf69f05cfe899e22f921fe90a75c130f4199f1fde12490fbaeffeb50c561733db56a1bf783f268a9e595bc23998b13ec36d7c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Ep4es16.exe

    Filesize

    727KB

    MD5

    b9696dd0013fca30faa5e2b7b838f532

    SHA1

    cace2853dae605619c3e2c996f501a32fbe315c8

    SHA256

    ffb410282d9e57b3f3d562eebc798b76762c8f58617216a756f97fbc20680b53

    SHA512

    ee918430861f35a9016806bae09cf69f05cfe899e22f921fe90a75c130f4199f1fde12490fbaeffeb50c561733db56a1bf783f268a9e595bc23998b13ec36d7c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\qo3Gb86.exe

    Filesize

    482KB

    MD5

    6cf5e6510366a411baea1903f9a1d156

    SHA1

    b6d3f05ea3433d84aea17f726dd7883379cf6a8e

    SHA256

    b91670545def5a9f1cd332ebf5cf353e78a4d3ac7db624b2958e4e7d89e89588

    SHA512

    015d556211661f5e6b8e224d9d299dc032f87d3b360d8e6fc7171e0f7f6868cb8881405aaf60ec8f87c132eee41543b4f93e9197020345f11001668a449e1874

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\qo3Gb86.exe

    Filesize

    482KB

    MD5

    6cf5e6510366a411baea1903f9a1d156

    SHA1

    b6d3f05ea3433d84aea17f726dd7883379cf6a8e

    SHA256

    b91670545def5a9f1cd332ebf5cf353e78a4d3ac7db624b2958e4e7d89e89588

    SHA512

    015d556211661f5e6b8e224d9d299dc032f87d3b360d8e6fc7171e0f7f6868cb8881405aaf60ec8f87c132eee41543b4f93e9197020345f11001668a449e1874

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dn66nn9.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dn66nn9.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe

    Filesize

    422KB

    MD5

    fdd20a849b0f01f2a94e505e8b65c2ab

    SHA1

    30ad3445c354f18e10cadf5b5a322599d1b4d475

    SHA256

    fcf7fbf3cada795f72b39a872d1534d6dafb1707938cb40214dce4c46063a38c

    SHA512

    2208a7f543beb47e145bbeb02ab2a723421dd22744074f1a0b7ec21a16efb408bd7a008e8b667dfc8fd2941e6bf7b95df55646288c6e93a651d8fc152b247604

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe

    Filesize

    422KB

    MD5

    fdd20a849b0f01f2a94e505e8b65c2ab

    SHA1

    30ad3445c354f18e10cadf5b5a322599d1b4d475

    SHA256

    fcf7fbf3cada795f72b39a872d1534d6dafb1707938cb40214dce4c46063a38c

    SHA512

    2208a7f543beb47e145bbeb02ab2a723421dd22744074f1a0b7ec21a16efb408bd7a008e8b667dfc8fd2941e6bf7b95df55646288c6e93a651d8fc152b247604

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe

    Filesize

    422KB

    MD5

    fdd20a849b0f01f2a94e505e8b65c2ab

    SHA1

    30ad3445c354f18e10cadf5b5a322599d1b4d475

    SHA256

    fcf7fbf3cada795f72b39a872d1534d6dafb1707938cb40214dce4c46063a38c

    SHA512

    2208a7f543beb47e145bbeb02ab2a723421dd22744074f1a0b7ec21a16efb408bd7a008e8b667dfc8fd2941e6bf7b95df55646288c6e93a651d8fc152b247604

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe

    Filesize

    422KB

    MD5

    fdd20a849b0f01f2a94e505e8b65c2ab

    SHA1

    30ad3445c354f18e10cadf5b5a322599d1b4d475

    SHA256

    fcf7fbf3cada795f72b39a872d1534d6dafb1707938cb40214dce4c46063a38c

    SHA512

    2208a7f543beb47e145bbeb02ab2a723421dd22744074f1a0b7ec21a16efb408bd7a008e8b667dfc8fd2941e6bf7b95df55646288c6e93a651d8fc152b247604

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe

    Filesize

    422KB

    MD5

    fdd20a849b0f01f2a94e505e8b65c2ab

    SHA1

    30ad3445c354f18e10cadf5b5a322599d1b4d475

    SHA256

    fcf7fbf3cada795f72b39a872d1534d6dafb1707938cb40214dce4c46063a38c

    SHA512

    2208a7f543beb47e145bbeb02ab2a723421dd22744074f1a0b7ec21a16efb408bd7a008e8b667dfc8fd2941e6bf7b95df55646288c6e93a651d8fc152b247604

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe

    Filesize

    422KB

    MD5

    fdd20a849b0f01f2a94e505e8b65c2ab

    SHA1

    30ad3445c354f18e10cadf5b5a322599d1b4d475

    SHA256

    fcf7fbf3cada795f72b39a872d1534d6dafb1707938cb40214dce4c46063a38c

    SHA512

    2208a7f543beb47e145bbeb02ab2a723421dd22744074f1a0b7ec21a16efb408bd7a008e8b667dfc8fd2941e6bf7b95df55646288c6e93a651d8fc152b247604

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2pQ5902.exe

    Filesize

    422KB

    MD5

    fdd20a849b0f01f2a94e505e8b65c2ab

    SHA1

    30ad3445c354f18e10cadf5b5a322599d1b4d475

    SHA256

    fcf7fbf3cada795f72b39a872d1534d6dafb1707938cb40214dce4c46063a38c

    SHA512

    2208a7f543beb47e145bbeb02ab2a723421dd22744074f1a0b7ec21a16efb408bd7a008e8b667dfc8fd2941e6bf7b95df55646288c6e93a651d8fc152b247604

  • memory/436-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/436-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/436-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/436-88-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/436-86-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/436-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/436-84-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/436-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/436-82-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/436-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2736-55-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-69-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-47-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-45-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-51-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-53-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-57-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-61-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-67-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-49-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-63-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-65-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-59-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-43-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-42-0x00000000047D0000-0x00000000047E6000-memory.dmp

    Filesize

    88KB

  • memory/2736-41-0x00000000047D0000-0x00000000047EC000-memory.dmp

    Filesize

    112KB

  • memory/2736-40-0x0000000004740000-0x000000000475E000-memory.dmp

    Filesize

    120KB