Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 18:53

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    640f146194706c948eebe8ea2674ccd7

  • SHA1

    1a0d6bd788e475a7c2a3d513a1a78f04fd98bf89

  • SHA256

    9ce1a1aa75b8cd48e3749cbccec8c6a568ddaf0de166d6b91813974dcde1f5ee

  • SHA512

    823b3a9402ffa419da14312acde12a3aa34e255c4a834a34eb23abb5e92a9ac3cc13e3245afe2eadd3f4214c43e7cd39d7ecafddaa04192e834907641ec96214

  • SSDEEP

    24576:jy5g8NFhGWXNOEwH9lgfcchFK99t5lZtMDtMvyd9r/RIsez7ZPe1T:2mOFoqOEGsRElXMxMvydV/RNg7Zq

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1768
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2356
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1580
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2588
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 268
                7⤵
                • Program crash
                PID:1404
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe

    Filesize

    1.0MB

    MD5

    59b75c1014cb8a90f63660b2672473b4

    SHA1

    ef0f3ccb8e4ddc4bd7222eb181329a8489d3d653

    SHA256

    92b7eb6d3c1bdf39ec93bcd1a7549f237e29cbba7ce64b3ea8d86ec5b3e956cd

    SHA512

    14d88171e8b64629a8f5f1ccd78673978d565fbbfb3125607a2a79b54eec085fabe0dacebca4c5849c6b349668895338036c1fe4b4f60ab8bbed1d9af09bfb0f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe

    Filesize

    1.0MB

    MD5

    59b75c1014cb8a90f63660b2672473b4

    SHA1

    ef0f3ccb8e4ddc4bd7222eb181329a8489d3d653

    SHA256

    92b7eb6d3c1bdf39ec93bcd1a7549f237e29cbba7ce64b3ea8d86ec5b3e956cd

    SHA512

    14d88171e8b64629a8f5f1ccd78673978d565fbbfb3125607a2a79b54eec085fabe0dacebca4c5849c6b349668895338036c1fe4b4f60ab8bbed1d9af09bfb0f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe

    Filesize

    744KB

    MD5

    92abac64fa989958fb799fca338bda79

    SHA1

    b201ba1014ff9e91e34da1a0d818fcbc91c59751

    SHA256

    5e7073245715b3969167dab41f4f4ce8eb7ca4eda0904e9e9b176e5fae871197

    SHA512

    3325fe9d67d31b1f1ae81c4aa8f646e96f0d31322ec81457fcc3181903962f8c13b106458182911003011f7ce11e7233ff5020980cfb01cfbf3321a14bf2abea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe

    Filesize

    744KB

    MD5

    92abac64fa989958fb799fca338bda79

    SHA1

    b201ba1014ff9e91e34da1a0d818fcbc91c59751

    SHA256

    5e7073245715b3969167dab41f4f4ce8eb7ca4eda0904e9e9b176e5fae871197

    SHA512

    3325fe9d67d31b1f1ae81c4aa8f646e96f0d31322ec81457fcc3181903962f8c13b106458182911003011f7ce11e7233ff5020980cfb01cfbf3321a14bf2abea

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe

    Filesize

    492KB

    MD5

    00fc800de2d3aee4e7a77629ea9c3285

    SHA1

    357bf31d956ba32846555c9220e88dd490d60664

    SHA256

    1a857b0138c49cb3cda619f1d64518a29d9ebc7035859040d15062c6a14ff1a3

    SHA512

    e1543fc41960da1945fbe27c9099c1329dd95c881f361e4b7db6dd4331f9b5310cbf854d1d037814faf21e8f36b9ad9c9b62c361efe3f509deaa3bdc0f629ac2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe

    Filesize

    492KB

    MD5

    00fc800de2d3aee4e7a77629ea9c3285

    SHA1

    357bf31d956ba32846555c9220e88dd490d60664

    SHA256

    1a857b0138c49cb3cda619f1d64518a29d9ebc7035859040d15062c6a14ff1a3

    SHA512

    e1543fc41960da1945fbe27c9099c1329dd95c881f361e4b7db6dd4331f9b5310cbf854d1d037814faf21e8f36b9ad9c9b62c361efe3f509deaa3bdc0f629ac2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

    Filesize

    446KB

    MD5

    907df2449daeb5f4fe8ecdef2b7530cf

    SHA1

    02d77afb5295c1b2e93e3896dd7010f7599b67b1

    SHA256

    5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

    SHA512

    3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

    Filesize

    446KB

    MD5

    907df2449daeb5f4fe8ecdef2b7530cf

    SHA1

    02d77afb5295c1b2e93e3896dd7010f7599b67b1

    SHA256

    5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

    SHA512

    3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe

    Filesize

    1.0MB

    MD5

    59b75c1014cb8a90f63660b2672473b4

    SHA1

    ef0f3ccb8e4ddc4bd7222eb181329a8489d3d653

    SHA256

    92b7eb6d3c1bdf39ec93bcd1a7549f237e29cbba7ce64b3ea8d86ec5b3e956cd

    SHA512

    14d88171e8b64629a8f5f1ccd78673978d565fbbfb3125607a2a79b54eec085fabe0dacebca4c5849c6b349668895338036c1fe4b4f60ab8bbed1d9af09bfb0f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe

    Filesize

    1.0MB

    MD5

    59b75c1014cb8a90f63660b2672473b4

    SHA1

    ef0f3ccb8e4ddc4bd7222eb181329a8489d3d653

    SHA256

    92b7eb6d3c1bdf39ec93bcd1a7549f237e29cbba7ce64b3ea8d86ec5b3e956cd

    SHA512

    14d88171e8b64629a8f5f1ccd78673978d565fbbfb3125607a2a79b54eec085fabe0dacebca4c5849c6b349668895338036c1fe4b4f60ab8bbed1d9af09bfb0f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe

    Filesize

    744KB

    MD5

    92abac64fa989958fb799fca338bda79

    SHA1

    b201ba1014ff9e91e34da1a0d818fcbc91c59751

    SHA256

    5e7073245715b3969167dab41f4f4ce8eb7ca4eda0904e9e9b176e5fae871197

    SHA512

    3325fe9d67d31b1f1ae81c4aa8f646e96f0d31322ec81457fcc3181903962f8c13b106458182911003011f7ce11e7233ff5020980cfb01cfbf3321a14bf2abea

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe

    Filesize

    744KB

    MD5

    92abac64fa989958fb799fca338bda79

    SHA1

    b201ba1014ff9e91e34da1a0d818fcbc91c59751

    SHA256

    5e7073245715b3969167dab41f4f4ce8eb7ca4eda0904e9e9b176e5fae871197

    SHA512

    3325fe9d67d31b1f1ae81c4aa8f646e96f0d31322ec81457fcc3181903962f8c13b106458182911003011f7ce11e7233ff5020980cfb01cfbf3321a14bf2abea

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe

    Filesize

    492KB

    MD5

    00fc800de2d3aee4e7a77629ea9c3285

    SHA1

    357bf31d956ba32846555c9220e88dd490d60664

    SHA256

    1a857b0138c49cb3cda619f1d64518a29d9ebc7035859040d15062c6a14ff1a3

    SHA512

    e1543fc41960da1945fbe27c9099c1329dd95c881f361e4b7db6dd4331f9b5310cbf854d1d037814faf21e8f36b9ad9c9b62c361efe3f509deaa3bdc0f629ac2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe

    Filesize

    492KB

    MD5

    00fc800de2d3aee4e7a77629ea9c3285

    SHA1

    357bf31d956ba32846555c9220e88dd490d60664

    SHA256

    1a857b0138c49cb3cda619f1d64518a29d9ebc7035859040d15062c6a14ff1a3

    SHA512

    e1543fc41960da1945fbe27c9099c1329dd95c881f361e4b7db6dd4331f9b5310cbf854d1d037814faf21e8f36b9ad9c9b62c361efe3f509deaa3bdc0f629ac2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

    Filesize

    446KB

    MD5

    907df2449daeb5f4fe8ecdef2b7530cf

    SHA1

    02d77afb5295c1b2e93e3896dd7010f7599b67b1

    SHA256

    5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

    SHA512

    3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

    Filesize

    446KB

    MD5

    907df2449daeb5f4fe8ecdef2b7530cf

    SHA1

    02d77afb5295c1b2e93e3896dd7010f7599b67b1

    SHA256

    5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

    SHA512

    3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

    Filesize

    446KB

    MD5

    907df2449daeb5f4fe8ecdef2b7530cf

    SHA1

    02d77afb5295c1b2e93e3896dd7010f7599b67b1

    SHA256

    5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

    SHA512

    3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

    Filesize

    446KB

    MD5

    907df2449daeb5f4fe8ecdef2b7530cf

    SHA1

    02d77afb5295c1b2e93e3896dd7010f7599b67b1

    SHA256

    5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

    SHA512

    3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

    Filesize

    446KB

    MD5

    907df2449daeb5f4fe8ecdef2b7530cf

    SHA1

    02d77afb5295c1b2e93e3896dd7010f7599b67b1

    SHA256

    5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

    SHA512

    3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

    Filesize

    446KB

    MD5

    907df2449daeb5f4fe8ecdef2b7530cf

    SHA1

    02d77afb5295c1b2e93e3896dd7010f7599b67b1

    SHA256

    5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

    SHA512

    3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

  • memory/2356-42-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-43-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-57-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-59-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-61-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-65-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-69-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-67-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-63-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-53-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-45-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-41-0x0000000000480000-0x000000000049C000-memory.dmp

    Filesize

    112KB

  • memory/2356-40-0x0000000000300000-0x000000000031E000-memory.dmp

    Filesize

    120KB

  • memory/2356-55-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-47-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-49-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2356-51-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/2588-77-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2588-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2588-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2588-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2588-85-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2588-87-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2588-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2588-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2588-78-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2588-76-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB