Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 18:11

General

  • Target

    2b3d38d4156d45bd997548a7e71e71c9.exe

  • Size

    1.2MB

  • MD5

    2b3d38d4156d45bd997548a7e71e71c9

  • SHA1

    bf9e6df5ce561b55607913afed473a7ca330bd82

  • SHA256

    e51e7bacb5a1faf905f2c8d594386a91eb98fa118bad56da3153c381f2c37897

  • SHA512

    ad12768a1fe1f4852671d7d5dfb41b49af2c9ab238839c7aebd21f673e55a3926e7f68a2b8a5ab3d1c4242118221dbc238da3bd42d31d37a5f23e54da690ea36

  • SSDEEP

    24576:gyKBsiIsOdpysJ3/NDpYoL4A3tJI6Ghwp9lJBaTUkHkh/ap0bDu:nuN4BJ3/NDd4AbnGupDJB1WkhD

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b3d38d4156d45bd997548a7e71e71c9.exe
    "C:\Users\Admin\AppData\Local\Temp\2b3d38d4156d45bd997548a7e71e71c9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qs3UR22.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qs3UR22.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cc1ZF92.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cc1ZF92.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oz4fF88.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oz4fF88.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aZ27Ar7.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aZ27Ar7.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2644
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2dT8587.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2dT8587.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2564
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2140
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 268
                7⤵
                • Program crash
                PID:596
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qs3UR22.exe

    Filesize

    1.0MB

    MD5

    7d0e56a652820eb4f0d37abcb1425672

    SHA1

    9dce1ed2e988ac3641f90d03fc9fccab1d2187a8

    SHA256

    a6668f37c46e3a1ad8038c6f124c9943f53e09e50bad851be08bab04db7dfb49

    SHA512

    e3aabaf84742970e57f4e57aac26e0d3efb67513b367d42224bd04d7967cc83e820649a51a4bf9d315667f8a286dc7ab9cb13822fbb64964a0f8c883920d215e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qs3UR22.exe

    Filesize

    1.0MB

    MD5

    7d0e56a652820eb4f0d37abcb1425672

    SHA1

    9dce1ed2e988ac3641f90d03fc9fccab1d2187a8

    SHA256

    a6668f37c46e3a1ad8038c6f124c9943f53e09e50bad851be08bab04db7dfb49

    SHA512

    e3aabaf84742970e57f4e57aac26e0d3efb67513b367d42224bd04d7967cc83e820649a51a4bf9d315667f8a286dc7ab9cb13822fbb64964a0f8c883920d215e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cc1ZF92.exe

    Filesize

    747KB

    MD5

    25c5be099392a63152d34a2dead7aec9

    SHA1

    b289bb53fd501e4a9369fcdbfd4e735f41f588b4

    SHA256

    f716aaacfff07ceb3c9baa808f79db46fc60f10e1894f19e2a95f3654c9cd282

    SHA512

    3d4c3e173eedf1001bfc98cd40ffdfb7c48a82e2985d48b6c945661775733326b158fd30265f8c5795c143851b8379d7ce463b298235ba26522b1cdc7727c437

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cc1ZF92.exe

    Filesize

    747KB

    MD5

    25c5be099392a63152d34a2dead7aec9

    SHA1

    b289bb53fd501e4a9369fcdbfd4e735f41f588b4

    SHA256

    f716aaacfff07ceb3c9baa808f79db46fc60f10e1894f19e2a95f3654c9cd282

    SHA512

    3d4c3e173eedf1001bfc98cd40ffdfb7c48a82e2985d48b6c945661775733326b158fd30265f8c5795c143851b8379d7ce463b298235ba26522b1cdc7727c437

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oz4fF88.exe

    Filesize

    496KB

    MD5

    208debd86334d7f009ca4020728d4f16

    SHA1

    0ee87fe9cf5c220171ddb334773fe5d86be465ce

    SHA256

    c9e968f91e2a1ed2302c2cde6b27c947d72280595071312f5e9549e37624fea6

    SHA512

    a2b31d8c28b0b2e4214b1989afa2a6cbc84527eebdd4f1f28a4f55543962453aeb0c04a57c5fce6ae0e401e6f8e10fd69247d3c89a0e60fd677d7992ece658a2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oz4fF88.exe

    Filesize

    496KB

    MD5

    208debd86334d7f009ca4020728d4f16

    SHA1

    0ee87fe9cf5c220171ddb334773fe5d86be465ce

    SHA256

    c9e968f91e2a1ed2302c2cde6b27c947d72280595071312f5e9549e37624fea6

    SHA512

    a2b31d8c28b0b2e4214b1989afa2a6cbc84527eebdd4f1f28a4f55543962453aeb0c04a57c5fce6ae0e401e6f8e10fd69247d3c89a0e60fd677d7992ece658a2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aZ27Ar7.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aZ27Ar7.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2dT8587.exe

    Filesize

    450KB

    MD5

    5f92f6bfc6ea7bb4485c2d24e00f6e40

    SHA1

    208f98ddf6e38d861d933cc9e549e273810cfea2

    SHA256

    7e40b9964293988b2bd6c2db9702430df0d159c59b22ea26d5c547b590d78c50

    SHA512

    49c5b92fe77c8932c323f036058150f3389fd537840e74496f7479f1d0af68c2244b1de33332839bec3ba8028d58a0e6fedd18a08b3744ce4d54423d434f2d34

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2dT8587.exe

    Filesize

    450KB

    MD5

    5f92f6bfc6ea7bb4485c2d24e00f6e40

    SHA1

    208f98ddf6e38d861d933cc9e549e273810cfea2

    SHA256

    7e40b9964293988b2bd6c2db9702430df0d159c59b22ea26d5c547b590d78c50

    SHA512

    49c5b92fe77c8932c323f036058150f3389fd537840e74496f7479f1d0af68c2244b1de33332839bec3ba8028d58a0e6fedd18a08b3744ce4d54423d434f2d34

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Qs3UR22.exe

    Filesize

    1.0MB

    MD5

    7d0e56a652820eb4f0d37abcb1425672

    SHA1

    9dce1ed2e988ac3641f90d03fc9fccab1d2187a8

    SHA256

    a6668f37c46e3a1ad8038c6f124c9943f53e09e50bad851be08bab04db7dfb49

    SHA512

    e3aabaf84742970e57f4e57aac26e0d3efb67513b367d42224bd04d7967cc83e820649a51a4bf9d315667f8a286dc7ab9cb13822fbb64964a0f8c883920d215e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Qs3UR22.exe

    Filesize

    1.0MB

    MD5

    7d0e56a652820eb4f0d37abcb1425672

    SHA1

    9dce1ed2e988ac3641f90d03fc9fccab1d2187a8

    SHA256

    a6668f37c46e3a1ad8038c6f124c9943f53e09e50bad851be08bab04db7dfb49

    SHA512

    e3aabaf84742970e57f4e57aac26e0d3efb67513b367d42224bd04d7967cc83e820649a51a4bf9d315667f8a286dc7ab9cb13822fbb64964a0f8c883920d215e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Cc1ZF92.exe

    Filesize

    747KB

    MD5

    25c5be099392a63152d34a2dead7aec9

    SHA1

    b289bb53fd501e4a9369fcdbfd4e735f41f588b4

    SHA256

    f716aaacfff07ceb3c9baa808f79db46fc60f10e1894f19e2a95f3654c9cd282

    SHA512

    3d4c3e173eedf1001bfc98cd40ffdfb7c48a82e2985d48b6c945661775733326b158fd30265f8c5795c143851b8379d7ce463b298235ba26522b1cdc7727c437

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Cc1ZF92.exe

    Filesize

    747KB

    MD5

    25c5be099392a63152d34a2dead7aec9

    SHA1

    b289bb53fd501e4a9369fcdbfd4e735f41f588b4

    SHA256

    f716aaacfff07ceb3c9baa808f79db46fc60f10e1894f19e2a95f3654c9cd282

    SHA512

    3d4c3e173eedf1001bfc98cd40ffdfb7c48a82e2985d48b6c945661775733326b158fd30265f8c5795c143851b8379d7ce463b298235ba26522b1cdc7727c437

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\oz4fF88.exe

    Filesize

    496KB

    MD5

    208debd86334d7f009ca4020728d4f16

    SHA1

    0ee87fe9cf5c220171ddb334773fe5d86be465ce

    SHA256

    c9e968f91e2a1ed2302c2cde6b27c947d72280595071312f5e9549e37624fea6

    SHA512

    a2b31d8c28b0b2e4214b1989afa2a6cbc84527eebdd4f1f28a4f55543962453aeb0c04a57c5fce6ae0e401e6f8e10fd69247d3c89a0e60fd677d7992ece658a2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\oz4fF88.exe

    Filesize

    496KB

    MD5

    208debd86334d7f009ca4020728d4f16

    SHA1

    0ee87fe9cf5c220171ddb334773fe5d86be465ce

    SHA256

    c9e968f91e2a1ed2302c2cde6b27c947d72280595071312f5e9549e37624fea6

    SHA512

    a2b31d8c28b0b2e4214b1989afa2a6cbc84527eebdd4f1f28a4f55543962453aeb0c04a57c5fce6ae0e401e6f8e10fd69247d3c89a0e60fd677d7992ece658a2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1aZ27Ar7.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1aZ27Ar7.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2dT8587.exe

    Filesize

    450KB

    MD5

    5f92f6bfc6ea7bb4485c2d24e00f6e40

    SHA1

    208f98ddf6e38d861d933cc9e549e273810cfea2

    SHA256

    7e40b9964293988b2bd6c2db9702430df0d159c59b22ea26d5c547b590d78c50

    SHA512

    49c5b92fe77c8932c323f036058150f3389fd537840e74496f7479f1d0af68c2244b1de33332839bec3ba8028d58a0e6fedd18a08b3744ce4d54423d434f2d34

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2dT8587.exe

    Filesize

    450KB

    MD5

    5f92f6bfc6ea7bb4485c2d24e00f6e40

    SHA1

    208f98ddf6e38d861d933cc9e549e273810cfea2

    SHA256

    7e40b9964293988b2bd6c2db9702430df0d159c59b22ea26d5c547b590d78c50

    SHA512

    49c5b92fe77c8932c323f036058150f3389fd537840e74496f7479f1d0af68c2244b1de33332839bec3ba8028d58a0e6fedd18a08b3744ce4d54423d434f2d34

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2dT8587.exe

    Filesize

    450KB

    MD5

    5f92f6bfc6ea7bb4485c2d24e00f6e40

    SHA1

    208f98ddf6e38d861d933cc9e549e273810cfea2

    SHA256

    7e40b9964293988b2bd6c2db9702430df0d159c59b22ea26d5c547b590d78c50

    SHA512

    49c5b92fe77c8932c323f036058150f3389fd537840e74496f7479f1d0af68c2244b1de33332839bec3ba8028d58a0e6fedd18a08b3744ce4d54423d434f2d34

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2dT8587.exe

    Filesize

    450KB

    MD5

    5f92f6bfc6ea7bb4485c2d24e00f6e40

    SHA1

    208f98ddf6e38d861d933cc9e549e273810cfea2

    SHA256

    7e40b9964293988b2bd6c2db9702430df0d159c59b22ea26d5c547b590d78c50

    SHA512

    49c5b92fe77c8932c323f036058150f3389fd537840e74496f7479f1d0af68c2244b1de33332839bec3ba8028d58a0e6fedd18a08b3744ce4d54423d434f2d34

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2dT8587.exe

    Filesize

    450KB

    MD5

    5f92f6bfc6ea7bb4485c2d24e00f6e40

    SHA1

    208f98ddf6e38d861d933cc9e549e273810cfea2

    SHA256

    7e40b9964293988b2bd6c2db9702430df0d159c59b22ea26d5c547b590d78c50

    SHA512

    49c5b92fe77c8932c323f036058150f3389fd537840e74496f7479f1d0af68c2244b1de33332839bec3ba8028d58a0e6fedd18a08b3744ce4d54423d434f2d34

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2dT8587.exe

    Filesize

    450KB

    MD5

    5f92f6bfc6ea7bb4485c2d24e00f6e40

    SHA1

    208f98ddf6e38d861d933cc9e549e273810cfea2

    SHA256

    7e40b9964293988b2bd6c2db9702430df0d159c59b22ea26d5c547b590d78c50

    SHA512

    49c5b92fe77c8932c323f036058150f3389fd537840e74496f7479f1d0af68c2244b1de33332839bec3ba8028d58a0e6fedd18a08b3744ce4d54423d434f2d34

  • memory/2140-85-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2140-87-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2140-76-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2140-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2140-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2140-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2140-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2140-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2140-78-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2140-77-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2644-63-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-59-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-40-0x0000000000480000-0x000000000049E000-memory.dmp

    Filesize

    120KB

  • memory/2644-42-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-43-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-47-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-51-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-53-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-57-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-41-0x0000000000510000-0x000000000052C000-memory.dmp

    Filesize

    112KB

  • memory/2644-45-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-65-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-67-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-69-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-61-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-55-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB

  • memory/2644-49-0x0000000000510000-0x0000000000526000-memory.dmp

    Filesize

    88KB