Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:48

General

  • Target

    7e47789e9ee8000a1e73e4f867a18dabe50d80a03fecd5421c5492501333308a_JC.exe

  • Size

    1.1MB

  • MD5

    b41ee665e7c15cc2de8dfe5ea699578f

  • SHA1

    7ee5217f528011a3b7d690e91f7cbd7e85728bf9

  • SHA256

    7e47789e9ee8000a1e73e4f867a18dabe50d80a03fecd5421c5492501333308a

  • SHA512

    961748dad729756533586cc4e8fb7134d6c447f3b03fcf5f270ab878da1b7591a6bb7540aa1383fa22fcef8b7e93a94632130a06a9d3d6882419685345568978

  • SSDEEP

    24576:Iy5XcWG1KLJKSf6Y3z6GvfF47bRviCn7oXwkULWIjwPsVfDdNc4ynPBz:PCqKSf6Y3z7vM9vBn0wfKIj7FD/iZ

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e47789e9ee8000a1e73e4f867a18dabe50d80a03fecd5421c5492501333308a_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\7e47789e9ee8000a1e73e4f867a18dabe50d80a03fecd5421c5492501333308a_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dd0vg70.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dd0vg70.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Uk4uq44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Uk4uq44.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XH0AO37.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XH0AO37.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1qD24jW0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1qD24jW0.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2508
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1764
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 284
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dd0vg70.exe

      Filesize

      1020KB

      MD5

      4e651813a236549b118e74e21faaf912

      SHA1

      2152e5feb6ca117e8fd93c17d1508a0a66823464

      SHA256

      b1e5c44516f58fd81918fd651528226baff9abaa74f75b89f5f1e9c80d79383f

      SHA512

      a2b4c50cd1c755e1abe49bc4a6fe274a0e1d7c9f718c5881455e32b207f7ea7ba5e4f6541af55a554413c0bc6c5e82f5bdf169d3781efe977c5c34449f5afb3e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dd0vg70.exe

      Filesize

      1020KB

      MD5

      4e651813a236549b118e74e21faaf912

      SHA1

      2152e5feb6ca117e8fd93c17d1508a0a66823464

      SHA256

      b1e5c44516f58fd81918fd651528226baff9abaa74f75b89f5f1e9c80d79383f

      SHA512

      a2b4c50cd1c755e1abe49bc4a6fe274a0e1d7c9f718c5881455e32b207f7ea7ba5e4f6541af55a554413c0bc6c5e82f5bdf169d3781efe977c5c34449f5afb3e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Uk4uq44.exe

      Filesize

      725KB

      MD5

      7efb85b0a4fa401164424706d4d3f3f2

      SHA1

      cb7469afbd844979da1ae6675b0468ef18cfa70c

      SHA256

      21993d5e6281f8a170a9599aaee78e1ef6b186f99b1e73e224e7f3261daa09d4

      SHA512

      65946ae40fd9a58f4fe4c45103f917c6bb53deec835ca404433cf1ae63d15c798b1619f3b8f77222a9dc16d096a16fff006e4aadc067e6748eb6618f703412ed

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Uk4uq44.exe

      Filesize

      725KB

      MD5

      7efb85b0a4fa401164424706d4d3f3f2

      SHA1

      cb7469afbd844979da1ae6675b0468ef18cfa70c

      SHA256

      21993d5e6281f8a170a9599aaee78e1ef6b186f99b1e73e224e7f3261daa09d4

      SHA512

      65946ae40fd9a58f4fe4c45103f917c6bb53deec835ca404433cf1ae63d15c798b1619f3b8f77222a9dc16d096a16fff006e4aadc067e6748eb6618f703412ed

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XH0AO37.exe

      Filesize

      479KB

      MD5

      01f5cb1a81eeabcded8c28a5091aedfc

      SHA1

      a6c85e2fead3c1697871fc7425944bf7c7c6dc8d

      SHA256

      6bf414de09fe8c8fbd846ca0932682da39ab64e223b2fa7a2b33f8e75633065c

      SHA512

      e455f8bdbc2783941764162690bcaaed76edffc69c8b845236c0a360ca14ac9443b392bb47f7e2e0ad1b83e4e64d43cf231277230bf2d76b9cd9ff40e8739145

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XH0AO37.exe

      Filesize

      479KB

      MD5

      01f5cb1a81eeabcded8c28a5091aedfc

      SHA1

      a6c85e2fead3c1697871fc7425944bf7c7c6dc8d

      SHA256

      6bf414de09fe8c8fbd846ca0932682da39ab64e223b2fa7a2b33f8e75633065c

      SHA512

      e455f8bdbc2783941764162690bcaaed76edffc69c8b845236c0a360ca14ac9443b392bb47f7e2e0ad1b83e4e64d43cf231277230bf2d76b9cd9ff40e8739145

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1qD24jW0.exe

      Filesize

      194KB

      MD5

      35d718538c3e1346cb4fcf54aaa0f141

      SHA1

      234c0aa0465c27c190a83936e8e3aa3c4b991224

      SHA256

      97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

      SHA512

      4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1qD24jW0.exe

      Filesize

      194KB

      MD5

      35d718538c3e1346cb4fcf54aaa0f141

      SHA1

      234c0aa0465c27c190a83936e8e3aa3c4b991224

      SHA256

      97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

      SHA512

      4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe

      Filesize

      423KB

      MD5

      a1166e4a80d05011bcfefe57d8a57260

      SHA1

      9ea8719cbcc5414d257670f82edd0e9a70a0c0af

      SHA256

      7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

      SHA512

      48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe

      Filesize

      423KB

      MD5

      a1166e4a80d05011bcfefe57d8a57260

      SHA1

      9ea8719cbcc5414d257670f82edd0e9a70a0c0af

      SHA256

      7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

      SHA512

      48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe

      Filesize

      423KB

      MD5

      a1166e4a80d05011bcfefe57d8a57260

      SHA1

      9ea8719cbcc5414d257670f82edd0e9a70a0c0af

      SHA256

      7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

      SHA512

      48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\dd0vg70.exe

      Filesize

      1020KB

      MD5

      4e651813a236549b118e74e21faaf912

      SHA1

      2152e5feb6ca117e8fd93c17d1508a0a66823464

      SHA256

      b1e5c44516f58fd81918fd651528226baff9abaa74f75b89f5f1e9c80d79383f

      SHA512

      a2b4c50cd1c755e1abe49bc4a6fe274a0e1d7c9f718c5881455e32b207f7ea7ba5e4f6541af55a554413c0bc6c5e82f5bdf169d3781efe977c5c34449f5afb3e

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\dd0vg70.exe

      Filesize

      1020KB

      MD5

      4e651813a236549b118e74e21faaf912

      SHA1

      2152e5feb6ca117e8fd93c17d1508a0a66823464

      SHA256

      b1e5c44516f58fd81918fd651528226baff9abaa74f75b89f5f1e9c80d79383f

      SHA512

      a2b4c50cd1c755e1abe49bc4a6fe274a0e1d7c9f718c5881455e32b207f7ea7ba5e4f6541af55a554413c0bc6c5e82f5bdf169d3781efe977c5c34449f5afb3e

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Uk4uq44.exe

      Filesize

      725KB

      MD5

      7efb85b0a4fa401164424706d4d3f3f2

      SHA1

      cb7469afbd844979da1ae6675b0468ef18cfa70c

      SHA256

      21993d5e6281f8a170a9599aaee78e1ef6b186f99b1e73e224e7f3261daa09d4

      SHA512

      65946ae40fd9a58f4fe4c45103f917c6bb53deec835ca404433cf1ae63d15c798b1619f3b8f77222a9dc16d096a16fff006e4aadc067e6748eb6618f703412ed

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Uk4uq44.exe

      Filesize

      725KB

      MD5

      7efb85b0a4fa401164424706d4d3f3f2

      SHA1

      cb7469afbd844979da1ae6675b0468ef18cfa70c

      SHA256

      21993d5e6281f8a170a9599aaee78e1ef6b186f99b1e73e224e7f3261daa09d4

      SHA512

      65946ae40fd9a58f4fe4c45103f917c6bb53deec835ca404433cf1ae63d15c798b1619f3b8f77222a9dc16d096a16fff006e4aadc067e6748eb6618f703412ed

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\XH0AO37.exe

      Filesize

      479KB

      MD5

      01f5cb1a81eeabcded8c28a5091aedfc

      SHA1

      a6c85e2fead3c1697871fc7425944bf7c7c6dc8d

      SHA256

      6bf414de09fe8c8fbd846ca0932682da39ab64e223b2fa7a2b33f8e75633065c

      SHA512

      e455f8bdbc2783941764162690bcaaed76edffc69c8b845236c0a360ca14ac9443b392bb47f7e2e0ad1b83e4e64d43cf231277230bf2d76b9cd9ff40e8739145

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\XH0AO37.exe

      Filesize

      479KB

      MD5

      01f5cb1a81eeabcded8c28a5091aedfc

      SHA1

      a6c85e2fead3c1697871fc7425944bf7c7c6dc8d

      SHA256

      6bf414de09fe8c8fbd846ca0932682da39ab64e223b2fa7a2b33f8e75633065c

      SHA512

      e455f8bdbc2783941764162690bcaaed76edffc69c8b845236c0a360ca14ac9443b392bb47f7e2e0ad1b83e4e64d43cf231277230bf2d76b9cd9ff40e8739145

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1qD24jW0.exe

      Filesize

      194KB

      MD5

      35d718538c3e1346cb4fcf54aaa0f141

      SHA1

      234c0aa0465c27c190a83936e8e3aa3c4b991224

      SHA256

      97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

      SHA512

      4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1qD24jW0.exe

      Filesize

      194KB

      MD5

      35d718538c3e1346cb4fcf54aaa0f141

      SHA1

      234c0aa0465c27c190a83936e8e3aa3c4b991224

      SHA256

      97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

      SHA512

      4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe

      Filesize

      423KB

      MD5

      a1166e4a80d05011bcfefe57d8a57260

      SHA1

      9ea8719cbcc5414d257670f82edd0e9a70a0c0af

      SHA256

      7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

      SHA512

      48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe

      Filesize

      423KB

      MD5

      a1166e4a80d05011bcfefe57d8a57260

      SHA1

      9ea8719cbcc5414d257670f82edd0e9a70a0c0af

      SHA256

      7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

      SHA512

      48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe

      Filesize

      423KB

      MD5

      a1166e4a80d05011bcfefe57d8a57260

      SHA1

      9ea8719cbcc5414d257670f82edd0e9a70a0c0af

      SHA256

      7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

      SHA512

      48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe

      Filesize

      423KB

      MD5

      a1166e4a80d05011bcfefe57d8a57260

      SHA1

      9ea8719cbcc5414d257670f82edd0e9a70a0c0af

      SHA256

      7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

      SHA512

      48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe

      Filesize

      423KB

      MD5

      a1166e4a80d05011bcfefe57d8a57260

      SHA1

      9ea8719cbcc5414d257670f82edd0e9a70a0c0af

      SHA256

      7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

      SHA512

      48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe

      Filesize

      423KB

      MD5

      a1166e4a80d05011bcfefe57d8a57260

      SHA1

      9ea8719cbcc5414d257670f82edd0e9a70a0c0af

      SHA256

      7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

      SHA512

      48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2vd7750.exe

      Filesize

      423KB

      MD5

      a1166e4a80d05011bcfefe57d8a57260

      SHA1

      9ea8719cbcc5414d257670f82edd0e9a70a0c0af

      SHA256

      7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

      SHA512

      48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

    • memory/1764-89-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-96-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-102-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-97-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-94-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-79-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-81-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-83-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-85-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-87-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-92-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1764-91-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2508-51-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-69-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-47-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-59-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-53-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-67-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-65-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-63-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-55-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-45-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-49-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-57-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-43-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-42-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB

    • memory/2508-41-0x00000000020D0000-0x00000000020EC000-memory.dmp

      Filesize

      112KB

    • memory/2508-40-0x0000000001F50000-0x0000000001F6E000-memory.dmp

      Filesize

      120KB

    • memory/2508-61-0x00000000020D0000-0x00000000020E6000-memory.dmp

      Filesize

      88KB