Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 02:11

General

  • Target

    1ed108159e00dc5fd3facc3afd465ed6.exe

  • Size

    1.7MB

  • MD5

    1ed108159e00dc5fd3facc3afd465ed6

  • SHA1

    9b63d0f6080ef4a31b64ff303cf62a0cfdef072d

  • SHA256

    59ba594ee916cd9e62c7c68a6c607d7026a422dfa91a1302d5df514b36073f92

  • SHA512

    b5569fb7c04559915a13290dadcfa295ef34dc5e9af7a51ccb26b623541d58d9f129135ec8b6d1f8c890d766ffae21e6b6084141bf3f021fdf9fe7757bf92130

  • SSDEEP

    24576:RyWLqnMmEXGwGjKLMoWnRjIGnFOnWx/AqJwHR6C/KNlakn95Ldu1mr5ziKwP8+Nu:EH9EG/ME0Ekx/glD9DuuDwNjfIcLlZ

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ed108159e00dc5fd3facc3afd465ed6.exe
    "C:\Users\Admin\AppData\Local\Temp\1ed108159e00dc5fd3facc3afd465ed6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ur6kI58.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ur6kI58.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\br1LY86.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\br1LY86.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2412
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2784
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 284
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ur6kI58.exe

    Filesize

    1.2MB

    MD5

    f5035842a0cc2d66568807773e7f857d

    SHA1

    60d81528152cd793c9a3eb795790415356272f28

    SHA256

    5e8f044ccdac1168e5d9420eac1550f8080e220675d276093bf03b50aa5db1a8

    SHA512

    e06eecb18b4a6ba43e4a0cb13ba604732793cced4fe1929ad67ff5a4d3bc498a67df4d6a655ae12519374c71651e3acac987361107cc8500b1cc941156a4325f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ur6kI58.exe

    Filesize

    1.2MB

    MD5

    f5035842a0cc2d66568807773e7f857d

    SHA1

    60d81528152cd793c9a3eb795790415356272f28

    SHA256

    5e8f044ccdac1168e5d9420eac1550f8080e220675d276093bf03b50aa5db1a8

    SHA512

    e06eecb18b4a6ba43e4a0cb13ba604732793cced4fe1929ad67ff5a4d3bc498a67df4d6a655ae12519374c71651e3acac987361107cc8500b1cc941156a4325f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\br1LY86.exe

    Filesize

    750KB

    MD5

    23a6c6b37803811963f296e251099af1

    SHA1

    68b915f33eb60c3f368a00748c23b2f4f5327651

    SHA256

    14e37262ade32f472daa3b75572808af2dd32e8e86f16179ace204074360a45d

    SHA512

    b1a17c647748b191960fe49709161b93d73361ffce2bed8725c63565c55a57214300be1d1881960bd5943ad651a68b661716867326cfd7c339bca67f81af3dcb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\br1LY86.exe

    Filesize

    750KB

    MD5

    23a6c6b37803811963f296e251099af1

    SHA1

    68b915f33eb60c3f368a00748c23b2f4f5327651

    SHA256

    14e37262ade32f472daa3b75572808af2dd32e8e86f16179ace204074360a45d

    SHA512

    b1a17c647748b191960fe49709161b93d73361ffce2bed8725c63565c55a57214300be1d1881960bd5943ad651a68b661716867326cfd7c339bca67f81af3dcb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe

    Filesize

    1.8MB

    MD5

    76330d7dd41b42491cf2ab4f8698f922

    SHA1

    60ef8a54833821201f50918f1db65e45f2ae37ca

    SHA256

    245bc96352c80c83c20e9fda776ea86b16d797cf267bae67644b7383b1340284

    SHA512

    f1077bcefc6408076eb239b5e0fb30c1dc7d6116ef36e771151fa6afd085e61d9e94e00262ebf7dee680a97b102a1f32029acc32781740114bd18146d5ccab79

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe

    Filesize

    1.8MB

    MD5

    76330d7dd41b42491cf2ab4f8698f922

    SHA1

    60ef8a54833821201f50918f1db65e45f2ae37ca

    SHA256

    245bc96352c80c83c20e9fda776ea86b16d797cf267bae67644b7383b1340284

    SHA512

    f1077bcefc6408076eb239b5e0fb30c1dc7d6116ef36e771151fa6afd085e61d9e94e00262ebf7dee680a97b102a1f32029acc32781740114bd18146d5ccab79

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe

    Filesize

    1.8MB

    MD5

    76330d7dd41b42491cf2ab4f8698f922

    SHA1

    60ef8a54833821201f50918f1db65e45f2ae37ca

    SHA256

    245bc96352c80c83c20e9fda776ea86b16d797cf267bae67644b7383b1340284

    SHA512

    f1077bcefc6408076eb239b5e0fb30c1dc7d6116ef36e771151fa6afd085e61d9e94e00262ebf7dee680a97b102a1f32029acc32781740114bd18146d5ccab79

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Ur6kI58.exe

    Filesize

    1.2MB

    MD5

    f5035842a0cc2d66568807773e7f857d

    SHA1

    60d81528152cd793c9a3eb795790415356272f28

    SHA256

    5e8f044ccdac1168e5d9420eac1550f8080e220675d276093bf03b50aa5db1a8

    SHA512

    e06eecb18b4a6ba43e4a0cb13ba604732793cced4fe1929ad67ff5a4d3bc498a67df4d6a655ae12519374c71651e3acac987361107cc8500b1cc941156a4325f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Ur6kI58.exe

    Filesize

    1.2MB

    MD5

    f5035842a0cc2d66568807773e7f857d

    SHA1

    60d81528152cd793c9a3eb795790415356272f28

    SHA256

    5e8f044ccdac1168e5d9420eac1550f8080e220675d276093bf03b50aa5db1a8

    SHA512

    e06eecb18b4a6ba43e4a0cb13ba604732793cced4fe1929ad67ff5a4d3bc498a67df4d6a655ae12519374c71651e3acac987361107cc8500b1cc941156a4325f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\br1LY86.exe

    Filesize

    750KB

    MD5

    23a6c6b37803811963f296e251099af1

    SHA1

    68b915f33eb60c3f368a00748c23b2f4f5327651

    SHA256

    14e37262ade32f472daa3b75572808af2dd32e8e86f16179ace204074360a45d

    SHA512

    b1a17c647748b191960fe49709161b93d73361ffce2bed8725c63565c55a57214300be1d1881960bd5943ad651a68b661716867326cfd7c339bca67f81af3dcb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\br1LY86.exe

    Filesize

    750KB

    MD5

    23a6c6b37803811963f296e251099af1

    SHA1

    68b915f33eb60c3f368a00748c23b2f4f5327651

    SHA256

    14e37262ade32f472daa3b75572808af2dd32e8e86f16179ace204074360a45d

    SHA512

    b1a17c647748b191960fe49709161b93d73361ffce2bed8725c63565c55a57214300be1d1881960bd5943ad651a68b661716867326cfd7c339bca67f81af3dcb

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe

    Filesize

    1.8MB

    MD5

    76330d7dd41b42491cf2ab4f8698f922

    SHA1

    60ef8a54833821201f50918f1db65e45f2ae37ca

    SHA256

    245bc96352c80c83c20e9fda776ea86b16d797cf267bae67644b7383b1340284

    SHA512

    f1077bcefc6408076eb239b5e0fb30c1dc7d6116ef36e771151fa6afd085e61d9e94e00262ebf7dee680a97b102a1f32029acc32781740114bd18146d5ccab79

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe

    Filesize

    1.8MB

    MD5

    76330d7dd41b42491cf2ab4f8698f922

    SHA1

    60ef8a54833821201f50918f1db65e45f2ae37ca

    SHA256

    245bc96352c80c83c20e9fda776ea86b16d797cf267bae67644b7383b1340284

    SHA512

    f1077bcefc6408076eb239b5e0fb30c1dc7d6116ef36e771151fa6afd085e61d9e94e00262ebf7dee680a97b102a1f32029acc32781740114bd18146d5ccab79

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe

    Filesize

    1.8MB

    MD5

    76330d7dd41b42491cf2ab4f8698f922

    SHA1

    60ef8a54833821201f50918f1db65e45f2ae37ca

    SHA256

    245bc96352c80c83c20e9fda776ea86b16d797cf267bae67644b7383b1340284

    SHA512

    f1077bcefc6408076eb239b5e0fb30c1dc7d6116ef36e771151fa6afd085e61d9e94e00262ebf7dee680a97b102a1f32029acc32781740114bd18146d5ccab79

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe

    Filesize

    1.8MB

    MD5

    76330d7dd41b42491cf2ab4f8698f922

    SHA1

    60ef8a54833821201f50918f1db65e45f2ae37ca

    SHA256

    245bc96352c80c83c20e9fda776ea86b16d797cf267bae67644b7383b1340284

    SHA512

    f1077bcefc6408076eb239b5e0fb30c1dc7d6116ef36e771151fa6afd085e61d9e94e00262ebf7dee680a97b102a1f32029acc32781740114bd18146d5ccab79

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe

    Filesize

    1.8MB

    MD5

    76330d7dd41b42491cf2ab4f8698f922

    SHA1

    60ef8a54833821201f50918f1db65e45f2ae37ca

    SHA256

    245bc96352c80c83c20e9fda776ea86b16d797cf267bae67644b7383b1340284

    SHA512

    f1077bcefc6408076eb239b5e0fb30c1dc7d6116ef36e771151fa6afd085e61d9e94e00262ebf7dee680a97b102a1f32029acc32781740114bd18146d5ccab79

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe

    Filesize

    1.8MB

    MD5

    76330d7dd41b42491cf2ab4f8698f922

    SHA1

    60ef8a54833821201f50918f1db65e45f2ae37ca

    SHA256

    245bc96352c80c83c20e9fda776ea86b16d797cf267bae67644b7383b1340284

    SHA512

    f1077bcefc6408076eb239b5e0fb30c1dc7d6116ef36e771151fa6afd085e61d9e94e00262ebf7dee680a97b102a1f32029acc32781740114bd18146d5ccab79

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1ic65Sm3.exe

    Filesize

    1.8MB

    MD5

    76330d7dd41b42491cf2ab4f8698f922

    SHA1

    60ef8a54833821201f50918f1db65e45f2ae37ca

    SHA256

    245bc96352c80c83c20e9fda776ea86b16d797cf267bae67644b7383b1340284

    SHA512

    f1077bcefc6408076eb239b5e0fb30c1dc7d6116ef36e771151fa6afd085e61d9e94e00262ebf7dee680a97b102a1f32029acc32781740114bd18146d5ccab79

  • memory/2784-37-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2784-73-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-41-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2784-38-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2784-43-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2784-36-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2784-34-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2784-33-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2784-35-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2784-48-0x0000000000310000-0x000000000032E000-memory.dmp

    Filesize

    120KB

  • memory/2784-49-0x00000000003B0000-0x00000000003CC000-memory.dmp

    Filesize

    112KB

  • memory/2784-77-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-75-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-39-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2784-71-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-69-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-67-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-65-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-63-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-61-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-59-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-57-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-55-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-53-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-51-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/2784-50-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB