Analysis

  • max time kernel
    117s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 08:46

General

  • Target

    file.exe

  • Size

    1.0MB

  • MD5

    881eb140d503a417f9dd8a4e8382bfa3

  • SHA1

    06c756e61758544c880c14480c1ba0a378999138

  • SHA256

    04edc8669856f78c88c9fd9697fb5f8ba5250054da2f133fbf67c3ac15b806ce

  • SHA512

    58ef53ecb919883605a87604d46f8405f6c09c66f6cf85652d94ccbaccfcf5ee48e63cfe17b409debd1dca51c02177ed3269112136ee5a18b29abef9b05556b5

  • SSDEEP

    12288:yMrSy90+QBicNC0j/a8x01BOwPq3w65OE5vTkwkpOeekMNr8BBiTDrnf3zIzn36a:QyLQ9/OCAfcEO9zVQgLIznOwnSov

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2680
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1044

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe

          Filesize

          908KB

          MD5

          f826583bc8504092ba80283650a8c74e

          SHA1

          78fff769cca6e4442fe26771b59762170535119c

          SHA256

          9ff98dbf11a72f7efa62cfe31f2582f875d0015d277fa0bdc86e6a1e2b4b9233

          SHA512

          41945f8a3bcfde79decea367a7bf6d40853a303923a5de15c4929f5a5e9d098ca7ae8ac7bdd6191715302cb3a48ea569367610b1980147bc332a0f00fd291d44

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe

          Filesize

          908KB

          MD5

          f826583bc8504092ba80283650a8c74e

          SHA1

          78fff769cca6e4442fe26771b59762170535119c

          SHA256

          9ff98dbf11a72f7efa62cfe31f2582f875d0015d277fa0bdc86e6a1e2b4b9233

          SHA512

          41945f8a3bcfde79decea367a7bf6d40853a303923a5de15c4929f5a5e9d098ca7ae8ac7bdd6191715302cb3a48ea569367610b1980147bc332a0f00fd291d44

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe

          Filesize

          619KB

          MD5

          86347ff54d7d64f5e0d1d9f8827a58fe

          SHA1

          3f39ead7993dc313f0909b29f7ac60de49fefc0a

          SHA256

          e5c718401f34aeb06fa91347ddafae65d2ab3f78abd8221b563f4101a40effa5

          SHA512

          ef61f8fcd092a6b0dc94f374b78cb89f4e1159ecead0264f5a13f77a139307ed24daf71511a2412e7fd725e99baf5f45dce397a89cef1404dfb62b646eaafd13

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe

          Filesize

          619KB

          MD5

          86347ff54d7d64f5e0d1d9f8827a58fe

          SHA1

          3f39ead7993dc313f0909b29f7ac60de49fefc0a

          SHA256

          e5c718401f34aeb06fa91347ddafae65d2ab3f78abd8221b563f4101a40effa5

          SHA512

          ef61f8fcd092a6b0dc94f374b78cb89f4e1159ecead0264f5a13f77a139307ed24daf71511a2412e7fd725e99baf5f45dce397a89cef1404dfb62b646eaafd13

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe

          Filesize

          380KB

          MD5

          185048e72b7a467f9ee3176a29c7e19f

          SHA1

          5ed43bf50078300ec010cd0947605f3bcf2362e7

          SHA256

          f305c42978e8a3719c0695c6c5b6fb74583365ea235ac7ab7c5cc2aa26f97d0a

          SHA512

          a98cb384f7e8953b8a5430b200dada880c0761760ba80a8d55e20764ab0c8fcf49daadff7013548cb44f14a850e07fb6e309187c0d0746fc8ab5e4fb72c74631

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe

          Filesize

          380KB

          MD5

          185048e72b7a467f9ee3176a29c7e19f

          SHA1

          5ed43bf50078300ec010cd0947605f3bcf2362e7

          SHA256

          f305c42978e8a3719c0695c6c5b6fb74583365ea235ac7ab7c5cc2aa26f97d0a

          SHA512

          a98cb384f7e8953b8a5430b200dada880c0761760ba80a8d55e20764ab0c8fcf49daadff7013548cb44f14a850e07fb6e309187c0d0746fc8ab5e4fb72c74631

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

          Filesize

          237KB

          MD5

          4fc4f74b5ceba49aa553a9fd1168eaaf

          SHA1

          d69682ce8a99185e463462650bbd67bfeebe8bea

          SHA256

          e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

          SHA512

          378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

          Filesize

          237KB

          MD5

          4fc4f74b5ceba49aa553a9fd1168eaaf

          SHA1

          d69682ce8a99185e463462650bbd67bfeebe8bea

          SHA256

          e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

          SHA512

          378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe

          Filesize

          908KB

          MD5

          f826583bc8504092ba80283650a8c74e

          SHA1

          78fff769cca6e4442fe26771b59762170535119c

          SHA256

          9ff98dbf11a72f7efa62cfe31f2582f875d0015d277fa0bdc86e6a1e2b4b9233

          SHA512

          41945f8a3bcfde79decea367a7bf6d40853a303923a5de15c4929f5a5e9d098ca7ae8ac7bdd6191715302cb3a48ea569367610b1980147bc332a0f00fd291d44

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe

          Filesize

          908KB

          MD5

          f826583bc8504092ba80283650a8c74e

          SHA1

          78fff769cca6e4442fe26771b59762170535119c

          SHA256

          9ff98dbf11a72f7efa62cfe31f2582f875d0015d277fa0bdc86e6a1e2b4b9233

          SHA512

          41945f8a3bcfde79decea367a7bf6d40853a303923a5de15c4929f5a5e9d098ca7ae8ac7bdd6191715302cb3a48ea569367610b1980147bc332a0f00fd291d44

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe

          Filesize

          619KB

          MD5

          86347ff54d7d64f5e0d1d9f8827a58fe

          SHA1

          3f39ead7993dc313f0909b29f7ac60de49fefc0a

          SHA256

          e5c718401f34aeb06fa91347ddafae65d2ab3f78abd8221b563f4101a40effa5

          SHA512

          ef61f8fcd092a6b0dc94f374b78cb89f4e1159ecead0264f5a13f77a139307ed24daf71511a2412e7fd725e99baf5f45dce397a89cef1404dfb62b646eaafd13

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe

          Filesize

          619KB

          MD5

          86347ff54d7d64f5e0d1d9f8827a58fe

          SHA1

          3f39ead7993dc313f0909b29f7ac60de49fefc0a

          SHA256

          e5c718401f34aeb06fa91347ddafae65d2ab3f78abd8221b563f4101a40effa5

          SHA512

          ef61f8fcd092a6b0dc94f374b78cb89f4e1159ecead0264f5a13f77a139307ed24daf71511a2412e7fd725e99baf5f45dce397a89cef1404dfb62b646eaafd13

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe

          Filesize

          380KB

          MD5

          185048e72b7a467f9ee3176a29c7e19f

          SHA1

          5ed43bf50078300ec010cd0947605f3bcf2362e7

          SHA256

          f305c42978e8a3719c0695c6c5b6fb74583365ea235ac7ab7c5cc2aa26f97d0a

          SHA512

          a98cb384f7e8953b8a5430b200dada880c0761760ba80a8d55e20764ab0c8fcf49daadff7013548cb44f14a850e07fb6e309187c0d0746fc8ab5e4fb72c74631

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe

          Filesize

          380KB

          MD5

          185048e72b7a467f9ee3176a29c7e19f

          SHA1

          5ed43bf50078300ec010cd0947605f3bcf2362e7

          SHA256

          f305c42978e8a3719c0695c6c5b6fb74583365ea235ac7ab7c5cc2aa26f97d0a

          SHA512

          a98cb384f7e8953b8a5430b200dada880c0761760ba80a8d55e20764ab0c8fcf49daadff7013548cb44f14a850e07fb6e309187c0d0746fc8ab5e4fb72c74631

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

          Filesize

          237KB

          MD5

          4fc4f74b5ceba49aa553a9fd1168eaaf

          SHA1

          d69682ce8a99185e463462650bbd67bfeebe8bea

          SHA256

          e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

          SHA512

          378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

          Filesize

          237KB

          MD5

          4fc4f74b5ceba49aa553a9fd1168eaaf

          SHA1

          d69682ce8a99185e463462650bbd67bfeebe8bea

          SHA256

          e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

          SHA512

          378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

          Filesize

          237KB

          MD5

          4fc4f74b5ceba49aa553a9fd1168eaaf

          SHA1

          d69682ce8a99185e463462650bbd67bfeebe8bea

          SHA256

          e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

          SHA512

          378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

          Filesize

          237KB

          MD5

          4fc4f74b5ceba49aa553a9fd1168eaaf

          SHA1

          d69682ce8a99185e463462650bbd67bfeebe8bea

          SHA256

          e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

          SHA512

          378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

          Filesize

          237KB

          MD5

          4fc4f74b5ceba49aa553a9fd1168eaaf

          SHA1

          d69682ce8a99185e463462650bbd67bfeebe8bea

          SHA256

          e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

          SHA512

          378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

          Filesize

          237KB

          MD5

          4fc4f74b5ceba49aa553a9fd1168eaaf

          SHA1

          d69682ce8a99185e463462650bbd67bfeebe8bea

          SHA256

          e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

          SHA512

          378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

        • memory/2680-44-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2680-45-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2680-43-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2680-42-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2680-41-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2680-40-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2680-47-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2680-49-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB