Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:53

General

  • Target

    4ef43926413570732b4d8274dbc9f982.exe

  • Size

    1.2MB

  • MD5

    4ef43926413570732b4d8274dbc9f982

  • SHA1

    db5c8e94d4c587af34ebd6be8585cbfea1096214

  • SHA256

    636c6ce70675614887766e1917acb85bb99f076644ddf8c2329b6012d21adc22

  • SHA512

    99d6bbdd3b26809f85df2dce548aba29b9878ea5701cbebb0c957a65584a49ac15e678cb05bb6d9c830196b20612fe4f7f31e4df8d3da676234cb30f9284a8dd

  • SSDEEP

    24576:Sy4jVTMusF/Ngr30FUVkfAdFL9Pe9Hq1fC36+qBoAjZEzpqTh:5yVTM7lNM0aOfc7PAIf+6DoAjuqT

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ef43926413570732b4d8274dbc9f982.exe
    "C:\Users\Admin\AppData\Local\Temp\4ef43926413570732b4d8274dbc9f982.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3068
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3064
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:576
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 576 -s 268
                7⤵
                • Program crash
                PID:1508
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe

    Filesize

    1.0MB

    MD5

    12c76197b26e2c894a21329f6360c0cc

    SHA1

    c39b1974b09881000616d7a92cb573817704e0ef

    SHA256

    887ffb3354443027f49647990a5c5f9469640f588e8454a400b45e037107a7b3

    SHA512

    dc7c10e407571a333a50330872c9171e422c05493b8b7d6a7e9de922162d9b0d6a205cc7c099d6efe4145bd0fa6f8b9aab335f88fcd445d1d7c8fbfe197ab324

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe

    Filesize

    1.0MB

    MD5

    12c76197b26e2c894a21329f6360c0cc

    SHA1

    c39b1974b09881000616d7a92cb573817704e0ef

    SHA256

    887ffb3354443027f49647990a5c5f9469640f588e8454a400b45e037107a7b3

    SHA512

    dc7c10e407571a333a50330872c9171e422c05493b8b7d6a7e9de922162d9b0d6a205cc7c099d6efe4145bd0fa6f8b9aab335f88fcd445d1d7c8fbfe197ab324

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe

    Filesize

    742KB

    MD5

    a1068fd1ceec3bb415e56e97ba3a6b5a

    SHA1

    452c694a16a5db02b2168da3c9e478061008b444

    SHA256

    a42bdefa4b13ccdc6859d42894b0b6ef96b2cc440839b82179802133896e1ced

    SHA512

    280dab1ee5782fd61020b973fd13f7ce45530513ca18c0d3988d63c2fabd444809534c36c621ed34c5c1fb3d3e3d165a473095d46c225cb86a183aabb61d9587

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe

    Filesize

    742KB

    MD5

    a1068fd1ceec3bb415e56e97ba3a6b5a

    SHA1

    452c694a16a5db02b2168da3c9e478061008b444

    SHA256

    a42bdefa4b13ccdc6859d42894b0b6ef96b2cc440839b82179802133896e1ced

    SHA512

    280dab1ee5782fd61020b973fd13f7ce45530513ca18c0d3988d63c2fabd444809534c36c621ed34c5c1fb3d3e3d165a473095d46c225cb86a183aabb61d9587

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe

    Filesize

    491KB

    MD5

    a9d5c04cb6ce0d7ec72dfc9045c0e903

    SHA1

    81d41542e5d991a1877d9dd58898a64616cca5c0

    SHA256

    81873ca79382d1eda0aeb0377508d390f818b3d5b20990fcd808fd128d319348

    SHA512

    ad4fadc5bbcb8935ec0ab21735e93dc16141a0ce4b0b48bb3229257538266d29056bc8b74b5896416a0e0fa9b119a673e2085eb230127a0cf16ae74afb4df30e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe

    Filesize

    491KB

    MD5

    a9d5c04cb6ce0d7ec72dfc9045c0e903

    SHA1

    81d41542e5d991a1877d9dd58898a64616cca5c0

    SHA256

    81873ca79382d1eda0aeb0377508d390f818b3d5b20990fcd808fd128d319348

    SHA512

    ad4fadc5bbcb8935ec0ab21735e93dc16141a0ce4b0b48bb3229257538266d29056bc8b74b5896416a0e0fa9b119a673e2085eb230127a0cf16ae74afb4df30e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

    Filesize

    445KB

    MD5

    6184421c7a987e5764be532d036e7b75

    SHA1

    e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

    SHA256

    7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

    SHA512

    e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

    Filesize

    445KB

    MD5

    6184421c7a987e5764be532d036e7b75

    SHA1

    e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

    SHA256

    7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

    SHA512

    e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe

    Filesize

    1.0MB

    MD5

    12c76197b26e2c894a21329f6360c0cc

    SHA1

    c39b1974b09881000616d7a92cb573817704e0ef

    SHA256

    887ffb3354443027f49647990a5c5f9469640f588e8454a400b45e037107a7b3

    SHA512

    dc7c10e407571a333a50330872c9171e422c05493b8b7d6a7e9de922162d9b0d6a205cc7c099d6efe4145bd0fa6f8b9aab335f88fcd445d1d7c8fbfe197ab324

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\jX3gN49.exe

    Filesize

    1.0MB

    MD5

    12c76197b26e2c894a21329f6360c0cc

    SHA1

    c39b1974b09881000616d7a92cb573817704e0ef

    SHA256

    887ffb3354443027f49647990a5c5f9469640f588e8454a400b45e037107a7b3

    SHA512

    dc7c10e407571a333a50330872c9171e422c05493b8b7d6a7e9de922162d9b0d6a205cc7c099d6efe4145bd0fa6f8b9aab335f88fcd445d1d7c8fbfe197ab324

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe

    Filesize

    742KB

    MD5

    a1068fd1ceec3bb415e56e97ba3a6b5a

    SHA1

    452c694a16a5db02b2168da3c9e478061008b444

    SHA256

    a42bdefa4b13ccdc6859d42894b0b6ef96b2cc440839b82179802133896e1ced

    SHA512

    280dab1ee5782fd61020b973fd13f7ce45530513ca18c0d3988d63c2fabd444809534c36c621ed34c5c1fb3d3e3d165a473095d46c225cb86a183aabb61d9587

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ju1wm70.exe

    Filesize

    742KB

    MD5

    a1068fd1ceec3bb415e56e97ba3a6b5a

    SHA1

    452c694a16a5db02b2168da3c9e478061008b444

    SHA256

    a42bdefa4b13ccdc6859d42894b0b6ef96b2cc440839b82179802133896e1ced

    SHA512

    280dab1ee5782fd61020b973fd13f7ce45530513ca18c0d3988d63c2fabd444809534c36c621ed34c5c1fb3d3e3d165a473095d46c225cb86a183aabb61d9587

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe

    Filesize

    491KB

    MD5

    a9d5c04cb6ce0d7ec72dfc9045c0e903

    SHA1

    81d41542e5d991a1877d9dd58898a64616cca5c0

    SHA256

    81873ca79382d1eda0aeb0377508d390f818b3d5b20990fcd808fd128d319348

    SHA512

    ad4fadc5bbcb8935ec0ab21735e93dc16141a0ce4b0b48bb3229257538266d29056bc8b74b5896416a0e0fa9b119a673e2085eb230127a0cf16ae74afb4df30e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Dx2xK34.exe

    Filesize

    491KB

    MD5

    a9d5c04cb6ce0d7ec72dfc9045c0e903

    SHA1

    81d41542e5d991a1877d9dd58898a64616cca5c0

    SHA256

    81873ca79382d1eda0aeb0377508d390f818b3d5b20990fcd808fd128d319348

    SHA512

    ad4fadc5bbcb8935ec0ab21735e93dc16141a0ce4b0b48bb3229257538266d29056bc8b74b5896416a0e0fa9b119a673e2085eb230127a0cf16ae74afb4df30e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1pt10jw1.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

    Filesize

    445KB

    MD5

    6184421c7a987e5764be532d036e7b75

    SHA1

    e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

    SHA256

    7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

    SHA512

    e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

    Filesize

    445KB

    MD5

    6184421c7a987e5764be532d036e7b75

    SHA1

    e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

    SHA256

    7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

    SHA512

    e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

    Filesize

    445KB

    MD5

    6184421c7a987e5764be532d036e7b75

    SHA1

    e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

    SHA256

    7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

    SHA512

    e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

    Filesize

    445KB

    MD5

    6184421c7a987e5764be532d036e7b75

    SHA1

    e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

    SHA256

    7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

    SHA512

    e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

    Filesize

    445KB

    MD5

    6184421c7a987e5764be532d036e7b75

    SHA1

    e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

    SHA256

    7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

    SHA512

    e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2lS5294.exe

    Filesize

    445KB

    MD5

    6184421c7a987e5764be532d036e7b75

    SHA1

    e07d03cf588d9450b15dae7ec5e8cc29f974a2ad

    SHA256

    7e3c1f20dacbab1d8a20f84d9d12b7f04b134e7d1109c3f8d148fb825d0057ec

    SHA512

    e31ce8fda6d0dd2a69f22b40327f97c56d1e0c7c7fcfc7e23505f805c74b76f43f7049879695d96c72949bb1d17b014013a5a36f84a01d590573292b1cadf7e2

  • memory/576-88-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/576-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/576-76-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/576-86-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/576-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/576-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/576-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/576-78-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/576-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/576-77-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3068-57-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-63-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-40-0x00000000009C0000-0x00000000009DE000-memory.dmp

    Filesize

    120KB

  • memory/3068-42-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-43-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-69-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-65-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-67-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-61-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-41-0x00000000009E0000-0x00000000009FC000-memory.dmp

    Filesize

    112KB

  • memory/3068-45-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-59-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-55-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-51-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-53-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-49-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB

  • memory/3068-47-0x00000000009E0000-0x00000000009F6000-memory.dmp

    Filesize

    88KB