Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 02:46

General

  • Target

    75c3f1e0cf0362c72acca0115891ad6b.exe

  • Size

    1.1MB

  • MD5

    75c3f1e0cf0362c72acca0115891ad6b

  • SHA1

    924889a4ef75894659989c6944fccb6714a6eb1a

  • SHA256

    19e9f408f31b2b2a152eb5861bfab30964dd5c177e7f010e422df96c4f5df527

  • SHA512

    1be21ad9e21d49c44329bd99d3cb7ddd20731ebf1c829964a3e6db48bd7a02a150c97d534a9479d62f83827776f03630c6bf1c3c775697d8951c5e31aef6b0ee

  • SSDEEP

    12288:3Mrby90VMpKvMlJT6YPTJyOIhvJ8UFR39s98GxT0KnKjaM4q0t7B6IB7ERMCzZle:syEMM0lJVPdyOUvJ8U93MfKWTLED/YD

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 284
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:2680
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2712
  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp26Em9.exe
    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp26Em9.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3052
  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vm0rg16.exe
    C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vm0rg16.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2616
  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RJ5LW91.exe
    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RJ5LW91.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2752
  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\So2nA38.exe
    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\So2nA38.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3064
  • C:\Users\Admin\AppData\Local\Temp\75c3f1e0cf0362c72acca0115891ad6b.exe
    "C:\Users\Admin\AppData\Local\Temp\75c3f1e0cf0362c72acca0115891ad6b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\So2nA38.exe

    Filesize

    957KB

    MD5

    90535ff91adafec7acb0d7b400e1d2a1

    SHA1

    65c8b19129e4a9273e5781c298f7643189458fc5

    SHA256

    70459f1afdf026d75df8a2896f9b05d308dbbe804c33899bbe2d10cff936c55d

    SHA512

    13f300ba29d39bc4f4cd55c8daf67ceecd7fd8596839b5f4bd1176f89fdddd37ed1bb9556d91bcba3d8a922666aa6e70246290a81d4b56a4be7e8677780dc3fc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\So2nA38.exe

    Filesize

    957KB

    MD5

    90535ff91adafec7acb0d7b400e1d2a1

    SHA1

    65c8b19129e4a9273e5781c298f7643189458fc5

    SHA256

    70459f1afdf026d75df8a2896f9b05d308dbbe804c33899bbe2d10cff936c55d

    SHA512

    13f300ba29d39bc4f4cd55c8daf67ceecd7fd8596839b5f4bd1176f89fdddd37ed1bb9556d91bcba3d8a922666aa6e70246290a81d4b56a4be7e8677780dc3fc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RJ5LW91.exe

    Filesize

    656KB

    MD5

    5c2f7af49760859c16fe90b89ac97c4c

    SHA1

    3fb02f221d9be95e73f6d739c13e87cc051474ba

    SHA256

    46dcbec7a4204295925cc93f9901adda75fcdfca7819496dcc32caa02097e6f1

    SHA512

    66845fc8416cee40ac66b78acf85fd314ec04c98976406bd1bbc18d005b1764cdffbd740bc41a737e4bffea02abc06eee889b98f8a4f8b860ed9d82e9802109c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RJ5LW91.exe

    Filesize

    656KB

    MD5

    5c2f7af49760859c16fe90b89ac97c4c

    SHA1

    3fb02f221d9be95e73f6d739c13e87cc051474ba

    SHA256

    46dcbec7a4204295925cc93f9901adda75fcdfca7819496dcc32caa02097e6f1

    SHA512

    66845fc8416cee40ac66b78acf85fd314ec04c98976406bd1bbc18d005b1764cdffbd740bc41a737e4bffea02abc06eee889b98f8a4f8b860ed9d82e9802109c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vm0rg16.exe

    Filesize

    403KB

    MD5

    9cccc1d0c9fb4a2ea5dc7feed97faee8

    SHA1

    9417d97ba83c132c709fe2d0c1f2aa9094de4372

    SHA256

    41125219a2b33a9c659680f771379b0ca433020684e5749ff37976928deb9476

    SHA512

    e43ac7ad70d2805e941cb7f2f1f32798086df4077c596542005d28e398fa86bbe0033d3ac28647b7503840759c3ba0debf2344638256a16e00bea6f90843cd52

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vm0rg16.exe

    Filesize

    403KB

    MD5

    9cccc1d0c9fb4a2ea5dc7feed97faee8

    SHA1

    9417d97ba83c132c709fe2d0c1f2aa9094de4372

    SHA256

    41125219a2b33a9c659680f771379b0ca433020684e5749ff37976928deb9476

    SHA512

    e43ac7ad70d2805e941cb7f2f1f32798086df4077c596542005d28e398fa86bbe0033d3ac28647b7503840759c3ba0debf2344638256a16e00bea6f90843cd52

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp26Em9.exe

    Filesize

    277KB

    MD5

    605e9701057385cb0f22afe463ba2092

    SHA1

    53fda4108dc59f482f6fbf1067060a3c5d5e6b9f

    SHA256

    5b6a0ce1a7fc1f05b937ad856413bd6b5560ab1cfaf95be96fa7badd6b4412f3

    SHA512

    bba21a63bffe9b5d5f975a1ddcf6916aff2a1ccbdebe5d1cf95a09f68ac9204bb292a2b1058048548c4879e4ed6b83711c4eba08436deb2179aa99155d535193

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp26Em9.exe

    Filesize

    277KB

    MD5

    605e9701057385cb0f22afe463ba2092

    SHA1

    53fda4108dc59f482f6fbf1067060a3c5d5e6b9f

    SHA256

    5b6a0ce1a7fc1f05b937ad856413bd6b5560ab1cfaf95be96fa7badd6b4412f3

    SHA512

    bba21a63bffe9b5d5f975a1ddcf6916aff2a1ccbdebe5d1cf95a09f68ac9204bb292a2b1058048548c4879e4ed6b83711c4eba08436deb2179aa99155d535193

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\So2nA38.exe

    Filesize

    957KB

    MD5

    90535ff91adafec7acb0d7b400e1d2a1

    SHA1

    65c8b19129e4a9273e5781c298f7643189458fc5

    SHA256

    70459f1afdf026d75df8a2896f9b05d308dbbe804c33899bbe2d10cff936c55d

    SHA512

    13f300ba29d39bc4f4cd55c8daf67ceecd7fd8596839b5f4bd1176f89fdddd37ed1bb9556d91bcba3d8a922666aa6e70246290a81d4b56a4be7e8677780dc3fc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\So2nA38.exe

    Filesize

    957KB

    MD5

    90535ff91adafec7acb0d7b400e1d2a1

    SHA1

    65c8b19129e4a9273e5781c298f7643189458fc5

    SHA256

    70459f1afdf026d75df8a2896f9b05d308dbbe804c33899bbe2d10cff936c55d

    SHA512

    13f300ba29d39bc4f4cd55c8daf67ceecd7fd8596839b5f4bd1176f89fdddd37ed1bb9556d91bcba3d8a922666aa6e70246290a81d4b56a4be7e8677780dc3fc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\RJ5LW91.exe

    Filesize

    656KB

    MD5

    5c2f7af49760859c16fe90b89ac97c4c

    SHA1

    3fb02f221d9be95e73f6d739c13e87cc051474ba

    SHA256

    46dcbec7a4204295925cc93f9901adda75fcdfca7819496dcc32caa02097e6f1

    SHA512

    66845fc8416cee40ac66b78acf85fd314ec04c98976406bd1bbc18d005b1764cdffbd740bc41a737e4bffea02abc06eee889b98f8a4f8b860ed9d82e9802109c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\RJ5LW91.exe

    Filesize

    656KB

    MD5

    5c2f7af49760859c16fe90b89ac97c4c

    SHA1

    3fb02f221d9be95e73f6d739c13e87cc051474ba

    SHA256

    46dcbec7a4204295925cc93f9901adda75fcdfca7819496dcc32caa02097e6f1

    SHA512

    66845fc8416cee40ac66b78acf85fd314ec04c98976406bd1bbc18d005b1764cdffbd740bc41a737e4bffea02abc06eee889b98f8a4f8b860ed9d82e9802109c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\vm0rg16.exe

    Filesize

    403KB

    MD5

    9cccc1d0c9fb4a2ea5dc7feed97faee8

    SHA1

    9417d97ba83c132c709fe2d0c1f2aa9094de4372

    SHA256

    41125219a2b33a9c659680f771379b0ca433020684e5749ff37976928deb9476

    SHA512

    e43ac7ad70d2805e941cb7f2f1f32798086df4077c596542005d28e398fa86bbe0033d3ac28647b7503840759c3ba0debf2344638256a16e00bea6f90843cd52

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\vm0rg16.exe

    Filesize

    403KB

    MD5

    9cccc1d0c9fb4a2ea5dc7feed97faee8

    SHA1

    9417d97ba83c132c709fe2d0c1f2aa9094de4372

    SHA256

    41125219a2b33a9c659680f771379b0ca433020684e5749ff37976928deb9476

    SHA512

    e43ac7ad70d2805e941cb7f2f1f32798086df4077c596542005d28e398fa86bbe0033d3ac28647b7503840759c3ba0debf2344638256a16e00bea6f90843cd52

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp26Em9.exe

    Filesize

    277KB

    MD5

    605e9701057385cb0f22afe463ba2092

    SHA1

    53fda4108dc59f482f6fbf1067060a3c5d5e6b9f

    SHA256

    5b6a0ce1a7fc1f05b937ad856413bd6b5560ab1cfaf95be96fa7badd6b4412f3

    SHA512

    bba21a63bffe9b5d5f975a1ddcf6916aff2a1ccbdebe5d1cf95a09f68ac9204bb292a2b1058048548c4879e4ed6b83711c4eba08436deb2179aa99155d535193

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp26Em9.exe

    Filesize

    277KB

    MD5

    605e9701057385cb0f22afe463ba2092

    SHA1

    53fda4108dc59f482f6fbf1067060a3c5d5e6b9f

    SHA256

    5b6a0ce1a7fc1f05b937ad856413bd6b5560ab1cfaf95be96fa7badd6b4412f3

    SHA512

    bba21a63bffe9b5d5f975a1ddcf6916aff2a1ccbdebe5d1cf95a09f68ac9204bb292a2b1058048548c4879e4ed6b83711c4eba08436deb2179aa99155d535193

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp26Em9.exe

    Filesize

    277KB

    MD5

    605e9701057385cb0f22afe463ba2092

    SHA1

    53fda4108dc59f482f6fbf1067060a3c5d5e6b9f

    SHA256

    5b6a0ce1a7fc1f05b937ad856413bd6b5560ab1cfaf95be96fa7badd6b4412f3

    SHA512

    bba21a63bffe9b5d5f975a1ddcf6916aff2a1ccbdebe5d1cf95a09f68ac9204bb292a2b1058048548c4879e4ed6b83711c4eba08436deb2179aa99155d535193

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp26Em9.exe

    Filesize

    277KB

    MD5

    605e9701057385cb0f22afe463ba2092

    SHA1

    53fda4108dc59f482f6fbf1067060a3c5d5e6b9f

    SHA256

    5b6a0ce1a7fc1f05b937ad856413bd6b5560ab1cfaf95be96fa7badd6b4412f3

    SHA512

    bba21a63bffe9b5d5f975a1ddcf6916aff2a1ccbdebe5d1cf95a09f68ac9204bb292a2b1058048548c4879e4ed6b83711c4eba08436deb2179aa99155d535193

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp26Em9.exe

    Filesize

    277KB

    MD5

    605e9701057385cb0f22afe463ba2092

    SHA1

    53fda4108dc59f482f6fbf1067060a3c5d5e6b9f

    SHA256

    5b6a0ce1a7fc1f05b937ad856413bd6b5560ab1cfaf95be96fa7badd6b4412f3

    SHA512

    bba21a63bffe9b5d5f975a1ddcf6916aff2a1ccbdebe5d1cf95a09f68ac9204bb292a2b1058048548c4879e4ed6b83711c4eba08436deb2179aa99155d535193

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dp26Em9.exe

    Filesize

    277KB

    MD5

    605e9701057385cb0f22afe463ba2092

    SHA1

    53fda4108dc59f482f6fbf1067060a3c5d5e6b9f

    SHA256

    5b6a0ce1a7fc1f05b937ad856413bd6b5560ab1cfaf95be96fa7badd6b4412f3

    SHA512

    bba21a63bffe9b5d5f975a1ddcf6916aff2a1ccbdebe5d1cf95a09f68ac9204bb292a2b1058048548c4879e4ed6b83711c4eba08436deb2179aa99155d535193

  • memory/2712-45-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2712-47-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2712-40-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2712-49-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2712-44-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2712-41-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2712-42-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2712-43-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB