Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 02:24

General

  • Target

    file.exe

  • Size

    1.5MB

  • MD5

    36fe87e17f698cee62cb37407e5599c3

  • SHA1

    32c76beb60b164ae4e3ad941fb69fa0cfc4501fc

  • SHA256

    cebb46df2451d64834e9c9a3e383bc2eeb2b0ac7aaecd44830133b0d5d2bc9c1

  • SHA512

    6198609939809780f95e3fc4749b2df305b2aa55d7c135957f569ad267177cdce185d70843a015beb77199265226b28ccf343c651ab788f0f7b13a77722632e4

  • SSDEEP

    24576:gydoOxEAJJOe+78yRiBg44XzCJ+rPyX+SAN1SWv/DoP7vihwM7FwT9qgefACy:npJo8GFjCJ+PyxA6RM7Fo9qgeYC

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1952
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2780
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe

    Filesize

    1.3MB

    MD5

    96b59f6e7750196a1570bbab59ed630b

    SHA1

    894c8505b81874667c95e3a6d2d0951a0fc67df6

    SHA256

    b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254

    SHA512

    3115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe

    Filesize

    1.3MB

    MD5

    96b59f6e7750196a1570bbab59ed630b

    SHA1

    894c8505b81874667c95e3a6d2d0951a0fc67df6

    SHA256

    b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254

    SHA512

    3115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe

    Filesize

    931KB

    MD5

    21e5279078aa9cffed32b6ec11e26ad7

    SHA1

    52e7ffd4002437a8463e1f04df907278f89236a2

    SHA256

    9b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe

    SHA512

    a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe

    Filesize

    931KB

    MD5

    21e5279078aa9cffed32b6ec11e26ad7

    SHA1

    52e7ffd4002437a8463e1f04df907278f89236a2

    SHA256

    9b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe

    SHA512

    a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe

    Filesize

    548KB

    MD5

    8fd1ef2a08680c1c3d1cba5fb39fc584

    SHA1

    b1f1876e7f9839d0c7fdc87406c18e68149d7dbc

    SHA256

    0022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4

    SHA512

    3e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe

    Filesize

    548KB

    MD5

    8fd1ef2a08680c1c3d1cba5fb39fc584

    SHA1

    b1f1876e7f9839d0c7fdc87406c18e68149d7dbc

    SHA256

    0022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4

    SHA512

    3e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe

    Filesize

    1.3MB

    MD5

    96b59f6e7750196a1570bbab59ed630b

    SHA1

    894c8505b81874667c95e3a6d2d0951a0fc67df6

    SHA256

    b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254

    SHA512

    3115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Ak3yW35.exe

    Filesize

    1.3MB

    MD5

    96b59f6e7750196a1570bbab59ed630b

    SHA1

    894c8505b81874667c95e3a6d2d0951a0fc67df6

    SHA256

    b928dec5ff4df089733569c7c29ea1cfc4e2178a54327262283f6b16b8026254

    SHA512

    3115703777c351c50acff960b8cfd991ff7ed661c5fb36d4f28c0b69190a07dfe495536ccf7179de1388484bed4d09df212333ac890d975cb9c5a17f9dc4b732

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe

    Filesize

    931KB

    MD5

    21e5279078aa9cffed32b6ec11e26ad7

    SHA1

    52e7ffd4002437a8463e1f04df907278f89236a2

    SHA256

    9b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe

    SHA512

    a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ZX6Pt86.exe

    Filesize

    931KB

    MD5

    21e5279078aa9cffed32b6ec11e26ad7

    SHA1

    52e7ffd4002437a8463e1f04df907278f89236a2

    SHA256

    9b68af38117f978fb065d1b64203f0ffeb27ec4cd9eb1886eef1ca847d8f4bbe

    SHA512

    a53e3bc61c50c4ade3644602a6962ceeb949c23c2ae6cafb232c97048cc29e3178e2c8e181f8395904e12a9ab70daa382d4581fb4eaa26f196e341d9c72f6f01

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe

    Filesize

    548KB

    MD5

    8fd1ef2a08680c1c3d1cba5fb39fc584

    SHA1

    b1f1876e7f9839d0c7fdc87406c18e68149d7dbc

    SHA256

    0022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4

    SHA512

    3e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Df3MJ69.exe

    Filesize

    548KB

    MD5

    8fd1ef2a08680c1c3d1cba5fb39fc584

    SHA1

    b1f1876e7f9839d0c7fdc87406c18e68149d7dbc

    SHA256

    0022aaee914559a11c81af60075f27efac7aac5b9012563fefc950e3c84e50a4

    SHA512

    3e95a47bd635f68a67338684e08adacab2b66e817900afd576dd59c7bd6471b841aedefb0b774fbd6504523b80f8d808a4ff4d483464aa5cff7ae8a13b31c5b0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xb80qM6.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • memory/2780-40-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2780-42-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2780-44-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2780-46-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2780-48-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2780-49-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2780-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2780-51-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB