Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 02:24

General

  • Target

    file.exe

  • Size

    1.5MB

  • MD5

    36fe87e17f698cee62cb37407e5599c3

  • SHA1

    32c76beb60b164ae4e3ad941fb69fa0cfc4501fc

  • SHA256

    cebb46df2451d64834e9c9a3e383bc2eeb2b0ac7aaecd44830133b0d5d2bc9c1

  • SHA512

    6198609939809780f95e3fc4749b2df305b2aa55d7c135957f569ad267177cdce185d70843a015beb77199265226b28ccf343c651ab788f0f7b13a77722632e4

  • SSDEEP

    24576:gydoOxEAJJOe+78yRiBg44XzCJ+rPyX+SAN1SWv/DoP7vihwM7FwT9qgefACy:npJo8GFjCJ+PyxA6RM7Fo9qgeYC

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2904
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2672
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2624
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 280
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2504
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe

      Filesize

      1.3MB

      MD5

      96b59f6e7750196a1570bbab59ed630b

      SHA1

      894c8505b81874667c95e3a6d2d0951a0fc67df6

      SHA256

      b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254

      SHA512

      3115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe

      Filesize

      1.3MB

      MD5

      96b59f6e7750196a1570bbab59ed630b

      SHA1

      894c8505b81874667c95e3a6d2d0951a0fc67df6

      SHA256

      b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254

      SHA512

      3115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe

      Filesize

      931KB

      MD5

      21e5279078aa9cffed32b6ec11e26ad7

      SHA1

      52e7ffd4002437a8463e1f04df907278f89236a2

      SHA256

      9b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe

      SHA512

      a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe

      Filesize

      931KB

      MD5

      21e5279078aa9cffed32b6ec11e26ad7

      SHA1

      52e7ffd4002437a8463e1f04df907278f89236a2

      SHA256

      9b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe

      SHA512

      a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe

      Filesize

      548KB

      MD5

      8fd1ef2a08680c1c3d1cba5fb39fc584

      SHA1

      b1f1876e7f9839d0c7fdc87406c18e68149d7dbc

      SHA256

      0022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4

      SHA512

      3e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe

      Filesize

      548KB

      MD5

      8fd1ef2a08680c1c3d1cba5fb39fc584

      SHA1

      b1f1876e7f9839d0c7fdc87406c18e68149d7dbc

      SHA256

      0022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4

      SHA512

      3e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

      Filesize

      232KB

      MD5

      3ff825411b1fe07e712a5dcae34f80eb

      SHA1

      e3e4358cabfa74d6e36e26754b01ed78434a6877

      SHA256

      69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

      SHA512

      325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

      Filesize

      232KB

      MD5

      3ff825411b1fe07e712a5dcae34f80eb

      SHA1

      e3e4358cabfa74d6e36e26754b01ed78434a6877

      SHA256

      69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

      SHA512

      325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe

      Filesize

      1.3MB

      MD5

      96b59f6e7750196a1570bbab59ed630b

      SHA1

      894c8505b81874667c95e3a6d2d0951a0fc67df6

      SHA256

      b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254

      SHA512

      3115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe

      Filesize

      1.3MB

      MD5

      96b59f6e7750196a1570bbab59ed630b

      SHA1

      894c8505b81874667c95e3a6d2d0951a0fc67df6

      SHA256

      b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254

      SHA512

      3115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe

      Filesize

      931KB

      MD5

      21e5279078aa9cffed32b6ec11e26ad7

      SHA1

      52e7ffd4002437a8463e1f04df907278f89236a2

      SHA256

      9b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe

      SHA512

      a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe

      Filesize

      931KB

      MD5

      21e5279078aa9cffed32b6ec11e26ad7

      SHA1

      52e7ffd4002437a8463e1f04df907278f89236a2

      SHA256

      9b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe

      SHA512

      a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe

      Filesize

      548KB

      MD5

      8fd1ef2a08680c1c3d1cba5fb39fc584

      SHA1

      b1f1876e7f9839d0c7fdc87406c18e68149d7dbc

      SHA256

      0022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4

      SHA512

      3e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe

      Filesize

      548KB

      MD5

      8fd1ef2a08680c1c3d1cba5fb39fc584

      SHA1

      b1f1876e7f9839d0c7fdc87406c18e68149d7dbc

      SHA256

      0022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4

      SHA512

      3e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

      Filesize

      232KB

      MD5

      3ff825411b1fe07e712a5dcae34f80eb

      SHA1

      e3e4358cabfa74d6e36e26754b01ed78434a6877

      SHA256

      69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

      SHA512

      325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

      Filesize

      232KB

      MD5

      3ff825411b1fe07e712a5dcae34f80eb

      SHA1

      e3e4358cabfa74d6e36e26754b01ed78434a6877

      SHA256

      69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

      SHA512

      325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

      Filesize

      232KB

      MD5

      3ff825411b1fe07e712a5dcae34f80eb

      SHA1

      e3e4358cabfa74d6e36e26754b01ed78434a6877

      SHA256

      69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

      SHA512

      325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

      Filesize

      232KB

      MD5

      3ff825411b1fe07e712a5dcae34f80eb

      SHA1

      e3e4358cabfa74d6e36e26754b01ed78434a6877

      SHA256

      69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

      SHA512

      325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

      Filesize

      232KB

      MD5

      3ff825411b1fe07e712a5dcae34f80eb

      SHA1

      e3e4358cabfa74d6e36e26754b01ed78434a6877

      SHA256

      69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

      SHA512

      325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

      Filesize

      232KB

      MD5

      3ff825411b1fe07e712a5dcae34f80eb

      SHA1

      e3e4358cabfa74d6e36e26754b01ed78434a6877

      SHA256

      69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

      SHA512

      325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

    • memory/2572-44-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2572-45-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2572-42-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2572-41-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2572-49-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2572-47-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2572-43-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2572-40-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB