Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:51

General

  • Target

    4ef43926413570732b4d8274dbc9f982.exe

  • Size

    1.2MB

  • MD5

    4ef43926413570732b4d8274dbc9f982

  • SHA1

    db5c8e94d4c587af34ebd6be8585cbfea1096214

  • SHA256

    636c6ce70675614887766e1917acb85bb99f076644ddf8c2329b6012d21adc22

  • SHA512

    99d6bbdd3b26809f85df2dce548aba29b9878ea5701cbebb0c957a65584a49ac15e678cb05bb6d9c830196b20612fe4f7f31e4df8d3da676234cb30f9284a8dd

  • SSDEEP

    24576:Sy4jVTMusF/Ngr30FUVkfAdFL9Pe9Hq1fC36+qBoAjZEzpqTh:5yVTM7lNM0aOfc7PAIf+6DoAjuqT

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ef43926413570732b4d8274dbc9f982.exe
    "C:\Users\Admin\AppData\Local\Temp\4ef43926413570732b4d8274dbc9f982.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2628
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2556
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2348
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2168
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 268
                  7⤵
                  • Program crash
                  PID:3004
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 292
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe

      Filesize

      1.0MB

      MD5

      12c76197b26e2c894a21329f6360c0cc

      SHA1

      c39b1974b09881000616d7a92cb573817704e0ef

      SHA256

      887ffb3354443027f49647990a5c5f9469640f588e8454a400b45e037107a7b3

      SHA512

      dc7c10e407571a333a50330872c9171e422c05493b8b7d6a7e9de922162d9b0d6a205cc7c099d6efe4145bd0fa6f8b9aab335f88fcd445d1d7c8fbfe197ab324

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe

      Filesize

      1.0MB

      MD5

      12c76197b26e2c894a21329f6360c0cc

      SHA1

      c39b1974b09881000616d7a92cb573817704e0ef

      SHA256

      887ffb3354443027f49647990a5c5f9469640f588e8454a400b45e037107a7b3

      SHA512

      dc7c10e407571a333a50330872c9171e422c05493b8b7d6a7e9de922162d9b0d6a205cc7c099d6efe4145bd0fa6f8b9aab335f88fcd445d1d7c8fbfe197ab324

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe

      Filesize

      742KB

      MD5

      a1068fd1ceec3bb415e56e97ba3a6b5a

      SHA1

      452c694a16a5db02b2168da3c9e478061008b444

      SHA256

      a42bdefa4b13ccdc6859d42894b0b6ef96b2cc440839b82179802133896e1ced

      SHA512

      280dab1ee5782fd61020b973fd13f7ce45530513ca18c0d3988d63c2fabd444809534c36c621ed34c5c1fb3d3e3d165a473095d46c225cb86a183aabb61d9587

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe

      Filesize

      742KB

      MD5

      a1068fd1ceec3bb415e56e97ba3a6b5a

      SHA1

      452c694a16a5db02b2168da3c9e478061008b444

      SHA256

      a42bdefa4b13ccdc6859d42894b0b6ef96b2cc440839b82179802133896e1ced

      SHA512

      280dab1ee5782fd61020b973fd13f7ce45530513ca18c0d3988d63c2fabd444809534c36c621ed34c5c1fb3d3e3d165a473095d46c225cb86a183aabb61d9587

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe

      Filesize

      491KB

      MD5

      a9d5c04cb6ce0d7ec72dfc9045c0e903

      SHA1

      81d41542e5d991a1877d9dd58898a64616cca5c0

      SHA256

      81873ca79382d1eda0aeb0377508d390f818b3d5b20990fcd808fd128d319348

      SHA512

      ad4fadc5bbcb8935ec0ab21735e93dc16141a0ce4b0b48bb3229257538266d29056bc8b74b5896416a0e0fa9b119a673e2085eb230127a0cf16ae74afb4df30e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe

      Filesize

      491KB

      MD5

      a9d5c04cb6ce0d7ec72dfc9045c0e903

      SHA1

      81d41542e5d991a1877d9dd58898a64616cca5c0

      SHA256

      81873ca79382d1eda0aeb0377508d390f818b3d5b20990fcd808fd128d319348

      SHA512

      ad4fadc5bbcb8935ec0ab21735e93dc16141a0ce4b0b48bb3229257538266d29056bc8b74b5896416a0e0fa9b119a673e2085eb230127a0cf16ae74afb4df30e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

      Filesize

      445KB

      MD5

      6184421c7a987e5764be532d036e7b75

      SHA1

      e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

      SHA256

      7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

      SHA512

      e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

      Filesize

      445KB

      MD5

      6184421c7a987e5764be532d036e7b75

      SHA1

      e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

      SHA256

      7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

      SHA512

      e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe

      Filesize

      1.0MB

      MD5

      12c76197b26e2c894a21329f6360c0cc

      SHA1

      c39b1974b09881000616d7a92cb573817704e0ef

      SHA256

      887ffb3354443027f49647990a5c5f9469640f588e8454a400b45e037107a7b3

      SHA512

      dc7c10e407571a333a50330872c9171e422c05493b8b7d6a7e9de922162d9b0d6a205cc7c099d6efe4145bd0fa6f8b9aab335f88fcd445d1d7c8fbfe197ab324

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe

      Filesize

      1.0MB

      MD5

      12c76197b26e2c894a21329f6360c0cc

      SHA1

      c39b1974b09881000616d7a92cb573817704e0ef

      SHA256

      887ffb3354443027f49647990a5c5f9469640f588e8454a400b45e037107a7b3

      SHA512

      dc7c10e407571a333a50330872c9171e422c05493b8b7d6a7e9de922162d9b0d6a205cc7c099d6efe4145bd0fa6f8b9aab335f88fcd445d1d7c8fbfe197ab324

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe

      Filesize

      742KB

      MD5

      a1068fd1ceec3bb415e56e97ba3a6b5a

      SHA1

      452c694a16a5db02b2168da3c9e478061008b444

      SHA256

      a42bdefa4b13ccdc6859d42894b0b6ef96b2cc440839b82179802133896e1ced

      SHA512

      280dab1ee5782fd61020b973fd13f7ce45530513ca18c0d3988d63c2fabd444809534c36c621ed34c5c1fb3d3e3d165a473095d46c225cb86a183aabb61d9587

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe

      Filesize

      742KB

      MD5

      a1068fd1ceec3bb415e56e97ba3a6b5a

      SHA1

      452c694a16a5db02b2168da3c9e478061008b444

      SHA256

      a42bdefa4b13ccdc6859d42894b0b6ef96b2cc440839b82179802133896e1ced

      SHA512

      280dab1ee5782fd61020b973fd13f7ce45530513ca18c0d3988d63c2fabd444809534c36c621ed34c5c1fb3d3e3d165a473095d46c225cb86a183aabb61d9587

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe

      Filesize

      491KB

      MD5

      a9d5c04cb6ce0d7ec72dfc9045c0e903

      SHA1

      81d41542e5d991a1877d9dd58898a64616cca5c0

      SHA256

      81873ca79382d1eda0aeb0377508d390f818b3d5b20990fcd808fd128d319348

      SHA512

      ad4fadc5bbcb8935ec0ab21735e93dc16141a0ce4b0b48bb3229257538266d29056bc8b74b5896416a0e0fa9b119a673e2085eb230127a0cf16ae74afb4df30e

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe

      Filesize

      491KB

      MD5

      a9d5c04cb6ce0d7ec72dfc9045c0e903

      SHA1

      81d41542e5d991a1877d9dd58898a64616cca5c0

      SHA256

      81873ca79382d1eda0aeb0377508d390f818b3d5b20990fcd808fd128d319348

      SHA512

      ad4fadc5bbcb8935ec0ab21735e93dc16141a0ce4b0b48bb3229257538266d29056bc8b74b5896416a0e0fa9b119a673e2085eb230127a0cf16ae74afb4df30e

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

      Filesize

      445KB

      MD5

      6184421c7a987e5764be532d036e7b75

      SHA1

      e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

      SHA256

      7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

      SHA512

      e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

      Filesize

      445KB

      MD5

      6184421c7a987e5764be532d036e7b75

      SHA1

      e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

      SHA256

      7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

      SHA512

      e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

      Filesize

      445KB

      MD5

      6184421c7a987e5764be532d036e7b75

      SHA1

      e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

      SHA256

      7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

      SHA512

      e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

      Filesize

      445KB

      MD5

      6184421c7a987e5764be532d036e7b75

      SHA1

      e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

      SHA256

      7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

      SHA512

      e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

      Filesize

      445KB

      MD5

      6184421c7a987e5764be532d036e7b75

      SHA1

      e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

      SHA256

      7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

      SHA512

      e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

      Filesize

      445KB

      MD5

      6184421c7a987e5764be532d036e7b75

      SHA1

      e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

      SHA256

      7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

      SHA512

      e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

    • memory/2168-85-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2168-87-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2168-76-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2168-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2168-83-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2168-81-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2168-80-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2168-79-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2168-77-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2168-78-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2628-59-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-61-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-40-0x0000000000840000-0x000000000085E000-memory.dmp

      Filesize

      120KB

    • memory/2628-42-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-43-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-63-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-65-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-69-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-67-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-41-0x0000000001F50000-0x0000000001F6C000-memory.dmp

      Filesize

      112KB

    • memory/2628-45-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-57-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-55-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-53-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-51-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-49-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB

    • memory/2628-47-0x0000000001F50000-0x0000000001F66000-memory.dmp

      Filesize

      88KB