Analysis

  • max time kernel
    121s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 08:02

General

  • Target

    file.exe

  • Size

    1.0MB

  • MD5

    179abf66d3061592a32cd8ee6cbd2020

  • SHA1

    9ec4036c608787f3a559efa744d4e33c92e6753b

  • SHA256

    4593a33df0f188c697451fbae11171e5c70e20dc76b49180da848fcd3fd8198b

  • SHA512

    192e30a3b9b429b8a448bb59c790c8200c068bbaa833761816dd3a5c3e9f58eb5d7e93daf6e2c151dc93adc9affc63b76fd1b256556801a254a4db591d09e805

  • SSDEEP

    24576:iy4kKzQCF8H9OApLq8SqASdS0GfDgK/Hq1Q:J4kKF+H9nLRY1gue

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gu7lY27.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gu7lY27.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fQ7xd11.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fQ7xd11.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gZ2er48.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gZ2er48.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1200
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Wd66TY3.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Wd66TY3.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2108
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2500
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gu7lY27.exe

    Filesize

    903KB

    MD5

    12b9fb32a3ddc97ef552d062b47bef9d

    SHA1

    55a8f074d5fa04e526bd30f044103015107ed497

    SHA256

    780fef57b772dae2fdfe4cbef84c584877a82558d5b303d4ecffa8c5b3bbbfee

    SHA512

    8900db932b466cfd5044d830d96c5d18afa9f86e64d24acb0aeebae2b088fce8bc4db2b1c736653ab4e1a12f5107f6ecd31cb87b5b0e6c8d1fb76aec0d18a082

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gu7lY27.exe

    Filesize

    903KB

    MD5

    12b9fb32a3ddc97ef552d062b47bef9d

    SHA1

    55a8f074d5fa04e526bd30f044103015107ed497

    SHA256

    780fef57b772dae2fdfe4cbef84c584877a82558d5b303d4ecffa8c5b3bbbfee

    SHA512

    8900db932b466cfd5044d830d96c5d18afa9f86e64d24acb0aeebae2b088fce8bc4db2b1c736653ab4e1a12f5107f6ecd31cb87b5b0e6c8d1fb76aec0d18a082

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fQ7xd11.exe

    Filesize

    615KB

    MD5

    072aff50d6f9283d5798b65c7ddd96d5

    SHA1

    06b2c54cb701cd2caa6cf0629c01cf9ace462347

    SHA256

    c8cbc4d499df412e219637808ff0db4f4220bc49fd32da157c350cc6fdd05db4

    SHA512

    b0f82859a54b640e73f2d7d31665c096ab422f176deae741ee56949cd2d2e19220250e6f2a97495744b5b2d29ae6370d8a569c8c9294c5b43ea94dba2fe4ada8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fQ7xd11.exe

    Filesize

    615KB

    MD5

    072aff50d6f9283d5798b65c7ddd96d5

    SHA1

    06b2c54cb701cd2caa6cf0629c01cf9ace462347

    SHA256

    c8cbc4d499df412e219637808ff0db4f4220bc49fd32da157c350cc6fdd05db4

    SHA512

    b0f82859a54b640e73f2d7d31665c096ab422f176deae741ee56949cd2d2e19220250e6f2a97495744b5b2d29ae6370d8a569c8c9294c5b43ea94dba2fe4ada8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gZ2er48.exe

    Filesize

    376KB

    MD5

    3d8ec7e1f9da25e7e4e5cbfaa47d8976

    SHA1

    b3918bb8a4637a8564bcc50f02ff3fe04a0eb624

    SHA256

    2b72a3b8df3594d402680c4e0f864617454b48a5bedc83c60167e1e97d508fd8

    SHA512

    98db65097d88c025c62997930de04e621225d614f028e2b8838e5ee572b8c1e9173d54d36c66940ddec0e2a9c9e33046c9a205aa31ca25d9810bf121e932262b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gZ2er48.exe

    Filesize

    376KB

    MD5

    3d8ec7e1f9da25e7e4e5cbfaa47d8976

    SHA1

    b3918bb8a4637a8564bcc50f02ff3fe04a0eb624

    SHA256

    2b72a3b8df3594d402680c4e0f864617454b48a5bedc83c60167e1e97d508fd8

    SHA512

    98db65097d88c025c62997930de04e621225d614f028e2b8838e5ee572b8c1e9173d54d36c66940ddec0e2a9c9e33046c9a205aa31ca25d9810bf121e932262b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Wd66TY3.exe

    Filesize

    237KB

    MD5

    7ee6224b2dcf0173ce5e00ce48a0f5f3

    SHA1

    9b9810009b94529ae25618800cb05395e55d62b8

    SHA256

    79eb2b47cb58522fa4a0931f7b803a29f8c74157d258296d4d524d08d2fb80d3

    SHA512

    ec384f3e8ca358e3fc3b08b26838036164421385fa3a3de7df4c6b3e41f537fa1beda7d4af59204ec6ea08192731f67bab9437fd15280c7dfa5dc575a4fed839

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Wd66TY3.exe

    Filesize

    237KB

    MD5

    7ee6224b2dcf0173ce5e00ce48a0f5f3

    SHA1

    9b9810009b94529ae25618800cb05395e55d62b8

    SHA256

    79eb2b47cb58522fa4a0931f7b803a29f8c74157d258296d4d524d08d2fb80d3

    SHA512

    ec384f3e8ca358e3fc3b08b26838036164421385fa3a3de7df4c6b3e41f537fa1beda7d4af59204ec6ea08192731f67bab9437fd15280c7dfa5dc575a4fed839

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Gu7lY27.exe

    Filesize

    903KB

    MD5

    12b9fb32a3ddc97ef552d062b47bef9d

    SHA1

    55a8f074d5fa04e526bd30f044103015107ed497

    SHA256

    780fef57b772dae2fdfe4cbef84c584877a82558d5b303d4ecffa8c5b3bbbfee

    SHA512

    8900db932b466cfd5044d830d96c5d18afa9f86e64d24acb0aeebae2b088fce8bc4db2b1c736653ab4e1a12f5107f6ecd31cb87b5b0e6c8d1fb76aec0d18a082

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Gu7lY27.exe

    Filesize

    903KB

    MD5

    12b9fb32a3ddc97ef552d062b47bef9d

    SHA1

    55a8f074d5fa04e526bd30f044103015107ed497

    SHA256

    780fef57b772dae2fdfe4cbef84c584877a82558d5b303d4ecffa8c5b3bbbfee

    SHA512

    8900db932b466cfd5044d830d96c5d18afa9f86e64d24acb0aeebae2b088fce8bc4db2b1c736653ab4e1a12f5107f6ecd31cb87b5b0e6c8d1fb76aec0d18a082

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\fQ7xd11.exe

    Filesize

    615KB

    MD5

    072aff50d6f9283d5798b65c7ddd96d5

    SHA1

    06b2c54cb701cd2caa6cf0629c01cf9ace462347

    SHA256

    c8cbc4d499df412e219637808ff0db4f4220bc49fd32da157c350cc6fdd05db4

    SHA512

    b0f82859a54b640e73f2d7d31665c096ab422f176deae741ee56949cd2d2e19220250e6f2a97495744b5b2d29ae6370d8a569c8c9294c5b43ea94dba2fe4ada8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\fQ7xd11.exe

    Filesize

    615KB

    MD5

    072aff50d6f9283d5798b65c7ddd96d5

    SHA1

    06b2c54cb701cd2caa6cf0629c01cf9ace462347

    SHA256

    c8cbc4d499df412e219637808ff0db4f4220bc49fd32da157c350cc6fdd05db4

    SHA512

    b0f82859a54b640e73f2d7d31665c096ab422f176deae741ee56949cd2d2e19220250e6f2a97495744b5b2d29ae6370d8a569c8c9294c5b43ea94dba2fe4ada8

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\gZ2er48.exe

    Filesize

    376KB

    MD5

    3d8ec7e1f9da25e7e4e5cbfaa47d8976

    SHA1

    b3918bb8a4637a8564bcc50f02ff3fe04a0eb624

    SHA256

    2b72a3b8df3594d402680c4e0f864617454b48a5bedc83c60167e1e97d508fd8

    SHA512

    98db65097d88c025c62997930de04e621225d614f028e2b8838e5ee572b8c1e9173d54d36c66940ddec0e2a9c9e33046c9a205aa31ca25d9810bf121e932262b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\gZ2er48.exe

    Filesize

    376KB

    MD5

    3d8ec7e1f9da25e7e4e5cbfaa47d8976

    SHA1

    b3918bb8a4637a8564bcc50f02ff3fe04a0eb624

    SHA256

    2b72a3b8df3594d402680c4e0f864617454b48a5bedc83c60167e1e97d508fd8

    SHA512

    98db65097d88c025c62997930de04e621225d614f028e2b8838e5ee572b8c1e9173d54d36c66940ddec0e2a9c9e33046c9a205aa31ca25d9810bf121e932262b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Wd66TY3.exe

    Filesize

    237KB

    MD5

    7ee6224b2dcf0173ce5e00ce48a0f5f3

    SHA1

    9b9810009b94529ae25618800cb05395e55d62b8

    SHA256

    79eb2b47cb58522fa4a0931f7b803a29f8c74157d258296d4d524d08d2fb80d3

    SHA512

    ec384f3e8ca358e3fc3b08b26838036164421385fa3a3de7df4c6b3e41f537fa1beda7d4af59204ec6ea08192731f67bab9437fd15280c7dfa5dc575a4fed839

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Wd66TY3.exe

    Filesize

    237KB

    MD5

    7ee6224b2dcf0173ce5e00ce48a0f5f3

    SHA1

    9b9810009b94529ae25618800cb05395e55d62b8

    SHA256

    79eb2b47cb58522fa4a0931f7b803a29f8c74157d258296d4d524d08d2fb80d3

    SHA512

    ec384f3e8ca358e3fc3b08b26838036164421385fa3a3de7df4c6b3e41f537fa1beda7d4af59204ec6ea08192731f67bab9437fd15280c7dfa5dc575a4fed839

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Wd66TY3.exe

    Filesize

    237KB

    MD5

    7ee6224b2dcf0173ce5e00ce48a0f5f3

    SHA1

    9b9810009b94529ae25618800cb05395e55d62b8

    SHA256

    79eb2b47cb58522fa4a0931f7b803a29f8c74157d258296d4d524d08d2fb80d3

    SHA512

    ec384f3e8ca358e3fc3b08b26838036164421385fa3a3de7df4c6b3e41f537fa1beda7d4af59204ec6ea08192731f67bab9437fd15280c7dfa5dc575a4fed839

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Wd66TY3.exe

    Filesize

    237KB

    MD5

    7ee6224b2dcf0173ce5e00ce48a0f5f3

    SHA1

    9b9810009b94529ae25618800cb05395e55d62b8

    SHA256

    79eb2b47cb58522fa4a0931f7b803a29f8c74157d258296d4d524d08d2fb80d3

    SHA512

    ec384f3e8ca358e3fc3b08b26838036164421385fa3a3de7df4c6b3e41f537fa1beda7d4af59204ec6ea08192731f67bab9437fd15280c7dfa5dc575a4fed839

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Wd66TY3.exe

    Filesize

    237KB

    MD5

    7ee6224b2dcf0173ce5e00ce48a0f5f3

    SHA1

    9b9810009b94529ae25618800cb05395e55d62b8

    SHA256

    79eb2b47cb58522fa4a0931f7b803a29f8c74157d258296d4d524d08d2fb80d3

    SHA512

    ec384f3e8ca358e3fc3b08b26838036164421385fa3a3de7df4c6b3e41f537fa1beda7d4af59204ec6ea08192731f67bab9437fd15280c7dfa5dc575a4fed839

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Wd66TY3.exe

    Filesize

    237KB

    MD5

    7ee6224b2dcf0173ce5e00ce48a0f5f3

    SHA1

    9b9810009b94529ae25618800cb05395e55d62b8

    SHA256

    79eb2b47cb58522fa4a0931f7b803a29f8c74157d258296d4d524d08d2fb80d3

    SHA512

    ec384f3e8ca358e3fc3b08b26838036164421385fa3a3de7df4c6b3e41f537fa1beda7d4af59204ec6ea08192731f67bab9437fd15280c7dfa5dc575a4fed839

  • memory/2500-40-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2500-42-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2500-44-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2500-46-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2500-48-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2500-49-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2500-51-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2500-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB