Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 18:55

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    640f146194706c948eebe8ea2674ccd7

  • SHA1

    1a0d6bd788e475a7c2a3d513a1a78f04fd98bf89

  • SHA256

    9ce1a1aa75b8cd48e3749cbccec8c6a568ddaf0de166d6b91813974dcde1f5ee

  • SHA512

    823b3a9402ffa419da14312acde12a3aa34e255c4a834a34eb23abb5e92a9ac3cc13e3245afe2eadd3f4214c43e7cd39d7ecafddaa04192e834907641ec96214

  • SSDEEP

    24576:jy5g8NFhGWXNOEwH9lgfcchFK99t5lZtMDtMvyd9r/RIsez7ZPe1T:2mOFoqOEGsRElXMxMvydV/RNg7Zq

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2804
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2832
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2984
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2492
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1884
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 268
                  7⤵
                  • Program crash
                  PID:2700
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 292
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:704

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe

      Filesize

      1.0MB

      MD5

      59b75c1014cb8a90f63660b2672473b4

      SHA1

      ef0f3ccb8e4ddc4bd7222eb181329a8489d3d653

      SHA256

      92b7eb6d3c1bdf39ec93bcd1a7549f237e29cbba7ce64b3ea8d86ec5b3e956cd

      SHA512

      14d88171e8b64629a8f5f1ccd78673978d565fbbfb3125607a2a79b54eec085fabe0dacebca4c5849c6b349668895338036c1fe4b4f60ab8bbed1d9af09bfb0f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe

      Filesize

      1.0MB

      MD5

      59b75c1014cb8a90f63660b2672473b4

      SHA1

      ef0f3ccb8e4ddc4bd7222eb181329a8489d3d653

      SHA256

      92b7eb6d3c1bdf39ec93bcd1a7549f237e29cbba7ce64b3ea8d86ec5b3e956cd

      SHA512

      14d88171e8b64629a8f5f1ccd78673978d565fbbfb3125607a2a79b54eec085fabe0dacebca4c5849c6b349668895338036c1fe4b4f60ab8bbed1d9af09bfb0f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe

      Filesize

      744KB

      MD5

      92abac64fa989958fb799fca338bda79

      SHA1

      b201ba1014ff9e91e34da1a0d818fcbc91c59751

      SHA256

      5e7073245715b3969167dab41f4f4ce8eb7ca4eda0904e9e9b176e5fae871197

      SHA512

      3325fe9d67d31b1f1ae81c4aa8f646e96f0d31322ec81457fcc3181903962f8c13b106458182911003011f7ce11e7233ff5020980cfb01cfbf3321a14bf2abea

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe

      Filesize

      744KB

      MD5

      92abac64fa989958fb799fca338bda79

      SHA1

      b201ba1014ff9e91e34da1a0d818fcbc91c59751

      SHA256

      5e7073245715b3969167dab41f4f4ce8eb7ca4eda0904e9e9b176e5fae871197

      SHA512

      3325fe9d67d31b1f1ae81c4aa8f646e96f0d31322ec81457fcc3181903962f8c13b106458182911003011f7ce11e7233ff5020980cfb01cfbf3321a14bf2abea

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe

      Filesize

      492KB

      MD5

      00fc800de2d3aee4e7a77629ea9c3285

      SHA1

      357bf31d956ba32846555c9220e88dd490d60664

      SHA256

      1a857b0138c49cb3cda619f1d64518a29d9ebc7035859040d15062c6a14ff1a3

      SHA512

      e1543fc41960da1945fbe27c9099c1329dd95c881f361e4b7db6dd4331f9b5310cbf854d1d037814faf21e8f36b9ad9c9b62c361efe3f509deaa3bdc0f629ac2

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe

      Filesize

      492KB

      MD5

      00fc800de2d3aee4e7a77629ea9c3285

      SHA1

      357bf31d956ba32846555c9220e88dd490d60664

      SHA256

      1a857b0138c49cb3cda619f1d64518a29d9ebc7035859040d15062c6a14ff1a3

      SHA512

      e1543fc41960da1945fbe27c9099c1329dd95c881f361e4b7db6dd4331f9b5310cbf854d1d037814faf21e8f36b9ad9c9b62c361efe3f509deaa3bdc0f629ac2

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

      Filesize

      446KB

      MD5

      907df2449daeb5f4fe8ecdef2b7530cf

      SHA1

      02d77afb5295c1b2e93e3896dd7010f7599b67b1

      SHA256

      5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

      SHA512

      3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

      Filesize

      446KB

      MD5

      907df2449daeb5f4fe8ecdef2b7530cf

      SHA1

      02d77afb5295c1b2e93e3896dd7010f7599b67b1

      SHA256

      5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

      SHA512

      3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe

      Filesize

      1.0MB

      MD5

      59b75c1014cb8a90f63660b2672473b4

      SHA1

      ef0f3ccb8e4ddc4bd7222eb181329a8489d3d653

      SHA256

      92b7eb6d3c1bdf39ec93bcd1a7549f237e29cbba7ce64b3ea8d86ec5b3e956cd

      SHA512

      14d88171e8b64629a8f5f1ccd78673978d565fbbfb3125607a2a79b54eec085fabe0dacebca4c5849c6b349668895338036c1fe4b4f60ab8bbed1d9af09bfb0f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\kT7lA94.exe

      Filesize

      1.0MB

      MD5

      59b75c1014cb8a90f63660b2672473b4

      SHA1

      ef0f3ccb8e4ddc4bd7222eb181329a8489d3d653

      SHA256

      92b7eb6d3c1bdf39ec93bcd1a7549f237e29cbba7ce64b3ea8d86ec5b3e956cd

      SHA512

      14d88171e8b64629a8f5f1ccd78673978d565fbbfb3125607a2a79b54eec085fabe0dacebca4c5849c6b349668895338036c1fe4b4f60ab8bbed1d9af09bfb0f

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe

      Filesize

      744KB

      MD5

      92abac64fa989958fb799fca338bda79

      SHA1

      b201ba1014ff9e91e34da1a0d818fcbc91c59751

      SHA256

      5e7073245715b3969167dab41f4f4ce8eb7ca4eda0904e9e9b176e5fae871197

      SHA512

      3325fe9d67d31b1f1ae81c4aa8f646e96f0d31322ec81457fcc3181903962f8c13b106458182911003011f7ce11e7233ff5020980cfb01cfbf3321a14bf2abea

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Bc3GG96.exe

      Filesize

      744KB

      MD5

      92abac64fa989958fb799fca338bda79

      SHA1

      b201ba1014ff9e91e34da1a0d818fcbc91c59751

      SHA256

      5e7073245715b3969167dab41f4f4ce8eb7ca4eda0904e9e9b176e5fae871197

      SHA512

      3325fe9d67d31b1f1ae81c4aa8f646e96f0d31322ec81457fcc3181903962f8c13b106458182911003011f7ce11e7233ff5020980cfb01cfbf3321a14bf2abea

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe

      Filesize

      492KB

      MD5

      00fc800de2d3aee4e7a77629ea9c3285

      SHA1

      357bf31d956ba32846555c9220e88dd490d60664

      SHA256

      1a857b0138c49cb3cda619f1d64518a29d9ebc7035859040d15062c6a14ff1a3

      SHA512

      e1543fc41960da1945fbe27c9099c1329dd95c881f361e4b7db6dd4331f9b5310cbf854d1d037814faf21e8f36b9ad9c9b62c361efe3f509deaa3bdc0f629ac2

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\bq2WL98.exe

      Filesize

      492KB

      MD5

      00fc800de2d3aee4e7a77629ea9c3285

      SHA1

      357bf31d956ba32846555c9220e88dd490d60664

      SHA256

      1a857b0138c49cb3cda619f1d64518a29d9ebc7035859040d15062c6a14ff1a3

      SHA512

      e1543fc41960da1945fbe27c9099c1329dd95c881f361e4b7db6dd4331f9b5310cbf854d1d037814faf21e8f36b9ad9c9b62c361efe3f509deaa3bdc0f629ac2

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1pO02cY7.exe

      Filesize

      194KB

      MD5

      6241b03d68a610324ecda52f0f84e287

      SHA1

      da80280b6e3925e455925efd6c6e59a6118269c4

      SHA256

      ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

      SHA512

      a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

      Filesize

      446KB

      MD5

      907df2449daeb5f4fe8ecdef2b7530cf

      SHA1

      02d77afb5295c1b2e93e3896dd7010f7599b67b1

      SHA256

      5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

      SHA512

      3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

      Filesize

      446KB

      MD5

      907df2449daeb5f4fe8ecdef2b7530cf

      SHA1

      02d77afb5295c1b2e93e3896dd7010f7599b67b1

      SHA256

      5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

      SHA512

      3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

      Filesize

      446KB

      MD5

      907df2449daeb5f4fe8ecdef2b7530cf

      SHA1

      02d77afb5295c1b2e93e3896dd7010f7599b67b1

      SHA256

      5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

      SHA512

      3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

      Filesize

      446KB

      MD5

      907df2449daeb5f4fe8ecdef2b7530cf

      SHA1

      02d77afb5295c1b2e93e3896dd7010f7599b67b1

      SHA256

      5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

      SHA512

      3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

      Filesize

      446KB

      MD5

      907df2449daeb5f4fe8ecdef2b7530cf

      SHA1

      02d77afb5295c1b2e93e3896dd7010f7599b67b1

      SHA256

      5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

      SHA512

      3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uu5293.exe

      Filesize

      446KB

      MD5

      907df2449daeb5f4fe8ecdef2b7530cf

      SHA1

      02d77afb5295c1b2e93e3896dd7010f7599b67b1

      SHA256

      5dc0f8f2c146ac1c1cc8a4864088d79095fee5f8d8d09370c42ada18bc6eb007

      SHA512

      3fbcab1443b97efebc2f694b0d453d7cd460953cdfa67ff77f668e3c3df26689ae109dba8561280babf4f8d0868cdd3e70a0adb5d50bad38b21e30dcf33e0000

    • memory/1884-85-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1884-87-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1884-76-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1884-83-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1884-81-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1884-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/1884-80-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1884-79-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1884-78-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1884-77-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2832-57-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-63-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-40-0x00000000003D0000-0x00000000003EE000-memory.dmp

      Filesize

      120KB

    • memory/2832-42-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-43-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-69-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-65-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-67-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-61-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-41-0x00000000006E0000-0x00000000006FC000-memory.dmp

      Filesize

      112KB

    • memory/2832-45-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-59-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-55-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-53-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-51-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-49-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB

    • memory/2832-47-0x00000000006E0000-0x00000000006F6000-memory.dmp

      Filesize

      88KB