Analysis

  • max time kernel
    128s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 08:48

General

  • Target

    file.exe

  • Size

    1.0MB

  • MD5

    881eb140d503a417f9dd8a4e8382bfa3

  • SHA1

    06c756e61758544c880c14480c1ba0a378999138

  • SHA256

    04edc8669856f78c88c9fd9697fb5f8ba5250054da2f133fbf67c3ac15b806ce

  • SHA512

    58ef53ecb919883605a87604d46f8405f6c09c66f6cf85652d94ccbaccfcf5ee48e63cfe17b409debd1dca51c02177ed3269112136ee5a18b29abef9b05556b5

  • SSDEEP

    12288:yMrSy90+QBicNC0j/a8x01BOwPq3w65OE5vTkwkpOeekMNr8BBiTDrnf3zIzn36a:QyLQ9/OCAfcEO9zVQgLIznOwnSov

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2480
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1984
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2504
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:1668
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1760
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 288
                  6⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2876

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe

        Filesize

        908KB

        MD5

        f826583bc8504092ba80283650a8c74e

        SHA1

        78fff769cca6e4442fe26771b59762170535119c

        SHA256

        9ff98dbf11a72f7efa62cfe31f2582f875d0015d277fa0bdc86e6a1e2b4b9233

        SHA512

        41945f8a3bcfde79decea367a7bf6d40853a303923a5de15c4929f5a5e9d098ca7ae8ac7bdd6191715302cb3a48ea569367610b1980147bc332a0f00fd291d44

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe

        Filesize

        908KB

        MD5

        f826583bc8504092ba80283650a8c74e

        SHA1

        78fff769cca6e4442fe26771b59762170535119c

        SHA256

        9ff98dbf11a72f7efa62cfe31f2582f875d0015d277fa0bdc86e6a1e2b4b9233

        SHA512

        41945f8a3bcfde79decea367a7bf6d40853a303923a5de15c4929f5a5e9d098ca7ae8ac7bdd6191715302cb3a48ea569367610b1980147bc332a0f00fd291d44

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe

        Filesize

        619KB

        MD5

        86347ff54d7d64f5e0d1d9f8827a58fe

        SHA1

        3f39ead7993dc313f0909b29f7ac60de49fefc0a

        SHA256

        e5c718401f34aeb06fa91347ddafae65d2ab3f78abd8221b563f4101a40effa5

        SHA512

        ef61f8fcd092a6b0dc94f374b78cb89f4e1159ecead0264f5a13f77a139307ed24daf71511a2412e7fd725e99baf5f45dce397a89cef1404dfb62b646eaafd13

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe

        Filesize

        619KB

        MD5

        86347ff54d7d64f5e0d1d9f8827a58fe

        SHA1

        3f39ead7993dc313f0909b29f7ac60de49fefc0a

        SHA256

        e5c718401f34aeb06fa91347ddafae65d2ab3f78abd8221b563f4101a40effa5

        SHA512

        ef61f8fcd092a6b0dc94f374b78cb89f4e1159ecead0264f5a13f77a139307ed24daf71511a2412e7fd725e99baf5f45dce397a89cef1404dfb62b646eaafd13

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe

        Filesize

        380KB

        MD5

        185048e72b7a467f9ee3176a29c7e19f

        SHA1

        5ed43bf50078300ec010cd0947605f3bcf2362e7

        SHA256

        f305c42978e8a3719c0695c6c5b6fb74583365ea235ac7ab7c5cc2aa26f97d0a

        SHA512

        a98cb384f7e8953b8a5430b200dada880c0761760ba80a8d55e20764ab0c8fcf49daadff7013548cb44f14a850e07fb6e309187c0d0746fc8ab5e4fb72c74631

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe

        Filesize

        380KB

        MD5

        185048e72b7a467f9ee3176a29c7e19f

        SHA1

        5ed43bf50078300ec010cd0947605f3bcf2362e7

        SHA256

        f305c42978e8a3719c0695c6c5b6fb74583365ea235ac7ab7c5cc2aa26f97d0a

        SHA512

        a98cb384f7e8953b8a5430b200dada880c0761760ba80a8d55e20764ab0c8fcf49daadff7013548cb44f14a850e07fb6e309187c0d0746fc8ab5e4fb72c74631

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

        Filesize

        237KB

        MD5

        4fc4f74b5ceba49aa553a9fd1168eaaf

        SHA1

        d69682ce8a99185e463462650bbd67bfeebe8bea

        SHA256

        e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

        SHA512

        378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

        Filesize

        237KB

        MD5

        4fc4f74b5ceba49aa553a9fd1168eaaf

        SHA1

        d69682ce8a99185e463462650bbd67bfeebe8bea

        SHA256

        e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

        SHA512

        378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe

        Filesize

        908KB

        MD5

        f826583bc8504092ba80283650a8c74e

        SHA1

        78fff769cca6e4442fe26771b59762170535119c

        SHA256

        9ff98dbf11a72f7efa62cfe31f2582f875d0015d277fa0bdc86e6a1e2b4b9233

        SHA512

        41945f8a3bcfde79decea367a7bf6d40853a303923a5de15c4929f5a5e9d098ca7ae8ac7bdd6191715302cb3a48ea569367610b1980147bc332a0f00fd291d44

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\hw8DN76.exe

        Filesize

        908KB

        MD5

        f826583bc8504092ba80283650a8c74e

        SHA1

        78fff769cca6e4442fe26771b59762170535119c

        SHA256

        9ff98dbf11a72f7efa62cfe31f2582f875d0015d277fa0bdc86e6a1e2b4b9233

        SHA512

        41945f8a3bcfde79decea367a7bf6d40853a303923a5de15c4929f5a5e9d098ca7ae8ac7bdd6191715302cb3a48ea569367610b1980147bc332a0f00fd291d44

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe

        Filesize

        619KB

        MD5

        86347ff54d7d64f5e0d1d9f8827a58fe

        SHA1

        3f39ead7993dc313f0909b29f7ac60de49fefc0a

        SHA256

        e5c718401f34aeb06fa91347ddafae65d2ab3f78abd8221b563f4101a40effa5

        SHA512

        ef61f8fcd092a6b0dc94f374b78cb89f4e1159ecead0264f5a13f77a139307ed24daf71511a2412e7fd725e99baf5f45dce397a89cef1404dfb62b646eaafd13

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ZE9PB32.exe

        Filesize

        619KB

        MD5

        86347ff54d7d64f5e0d1d9f8827a58fe

        SHA1

        3f39ead7993dc313f0909b29f7ac60de49fefc0a

        SHA256

        e5c718401f34aeb06fa91347ddafae65d2ab3f78abd8221b563f4101a40effa5

        SHA512

        ef61f8fcd092a6b0dc94f374b78cb89f4e1159ecead0264f5a13f77a139307ed24daf71511a2412e7fd725e99baf5f45dce397a89cef1404dfb62b646eaafd13

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe

        Filesize

        380KB

        MD5

        185048e72b7a467f9ee3176a29c7e19f

        SHA1

        5ed43bf50078300ec010cd0947605f3bcf2362e7

        SHA256

        f305c42978e8a3719c0695c6c5b6fb74583365ea235ac7ab7c5cc2aa26f97d0a

        SHA512

        a98cb384f7e8953b8a5430b200dada880c0761760ba80a8d55e20764ab0c8fcf49daadff7013548cb44f14a850e07fb6e309187c0d0746fc8ab5e4fb72c74631

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\VG2rQ62.exe

        Filesize

        380KB

        MD5

        185048e72b7a467f9ee3176a29c7e19f

        SHA1

        5ed43bf50078300ec010cd0947605f3bcf2362e7

        SHA256

        f305c42978e8a3719c0695c6c5b6fb74583365ea235ac7ab7c5cc2aa26f97d0a

        SHA512

        a98cb384f7e8953b8a5430b200dada880c0761760ba80a8d55e20764ab0c8fcf49daadff7013548cb44f14a850e07fb6e309187c0d0746fc8ab5e4fb72c74631

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

        Filesize

        237KB

        MD5

        4fc4f74b5ceba49aa553a9fd1168eaaf

        SHA1

        d69682ce8a99185e463462650bbd67bfeebe8bea

        SHA256

        e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

        SHA512

        378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

        Filesize

        237KB

        MD5

        4fc4f74b5ceba49aa553a9fd1168eaaf

        SHA1

        d69682ce8a99185e463462650bbd67bfeebe8bea

        SHA256

        e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

        SHA512

        378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

        Filesize

        237KB

        MD5

        4fc4f74b5ceba49aa553a9fd1168eaaf

        SHA1

        d69682ce8a99185e463462650bbd67bfeebe8bea

        SHA256

        e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

        SHA512

        378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

        Filesize

        237KB

        MD5

        4fc4f74b5ceba49aa553a9fd1168eaaf

        SHA1

        d69682ce8a99185e463462650bbd67bfeebe8bea

        SHA256

        e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

        SHA512

        378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

        Filesize

        237KB

        MD5

        4fc4f74b5ceba49aa553a9fd1168eaaf

        SHA1

        d69682ce8a99185e463462650bbd67bfeebe8bea

        SHA256

        e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

        SHA512

        378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hc93cw6.exe

        Filesize

        237KB

        MD5

        4fc4f74b5ceba49aa553a9fd1168eaaf

        SHA1

        d69682ce8a99185e463462650bbd67bfeebe8bea

        SHA256

        e76a2b641b76f02643425f1bace761562e5f34b1497c61e23e6edc6ff091bb4b

        SHA512

        378d5a9ee5699c7792107ac136d1283af6409bf3dba010099ce659eb0a5b123a166d9f7e08f7073816589583457090dea349e05fea7b12cbde7a397ae6b1d48d

      • memory/1760-40-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/1760-41-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/1760-43-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/1760-42-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/1760-45-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/1760-44-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/1760-47-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/1760-49-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB