Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 16:21

General

  • Target

    file.exe

  • Size

    1.4MB

  • MD5

    428f35143424e2ee5c6f6c8935670a77

  • SHA1

    49987f37e1a1481c619bb52caa87e763813cf7b7

  • SHA256

    23234b9a70e8b2b07adac0ffbd422e4fa80bc5fa98a07d448566f83dc6fc7002

  • SHA512

    261ba47750ee0681434dbdc61ab940bde706c3451949be6aeb9177567fcff8dfd7e7da5bb504bbde8e0fa737cdf9aa717a061dbf6ce8290209e078afcabf6bee

  • SSDEEP

    24576:8yaatHT+/qY4zdOLpR/V2II7qfRiCFzdiH2f14o32bSaXgzBGxuLDv8SHo5RZqVs:raagiYTw1qZnzdiHYWoGbgFzr8SV

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lw0ER79.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lw0ER79.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mF5Kk81.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mF5Kk81.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mh2sA12.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mh2sA12.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2640
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2772
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lw0ER79.exe

    Filesize

    1.3MB

    MD5

    93b98bc4519a169bf93b3f2a4b7c820a

    SHA1

    79bd66a4873e57a9a83ce9ef82aae60c707be37c

    SHA256

    ddbf0b1885b90124c5ffba10dff3e66a658ba4a6d93a2f6b0f42b854c3715445

    SHA512

    21cafa460392cec822e7be7b17a01a7de5f3c724e7c1a45720e781fa8aa2d7e818f676c5dd26450a3e712f5db121379dab59d8afeaef0435a6ab02a8c812fe8e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lw0ER79.exe

    Filesize

    1.3MB

    MD5

    93b98bc4519a169bf93b3f2a4b7c820a

    SHA1

    79bd66a4873e57a9a83ce9ef82aae60c707be37c

    SHA256

    ddbf0b1885b90124c5ffba10dff3e66a658ba4a6d93a2f6b0f42b854c3715445

    SHA512

    21cafa460392cec822e7be7b17a01a7de5f3c724e7c1a45720e781fa8aa2d7e818f676c5dd26450a3e712f5db121379dab59d8afeaef0435a6ab02a8c812fe8e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mF5Kk81.exe

    Filesize

    895KB

    MD5

    ac9b9aafc5582ad1b5ef589e0d5379df

    SHA1

    d777d83b130e962fafd2bfe22c72e31858181d53

    SHA256

    6e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22

    SHA512

    ce2fb8326b12ad2253bcc6d9a81868629c2cd4695bbccc20f9bd90db9892af3dc9611faa620418cf0576ed18376356c19535c00e6ef1138faa7c974072c20bf1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mF5Kk81.exe

    Filesize

    895KB

    MD5

    ac9b9aafc5582ad1b5ef589e0d5379df

    SHA1

    d777d83b130e962fafd2bfe22c72e31858181d53

    SHA256

    6e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22

    SHA512

    ce2fb8326b12ad2253bcc6d9a81868629c2cd4695bbccc20f9bd90db9892af3dc9611faa620418cf0576ed18376356c19535c00e6ef1138faa7c974072c20bf1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mh2sA12.exe

    Filesize

    533KB

    MD5

    28b98a4bf4da3dcd6eb08b7f740f171e

    SHA1

    0476f9b0b1cf67920c51e3f0d29d80d170a127f0

    SHA256

    6b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a

    SHA512

    7fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mh2sA12.exe

    Filesize

    533KB

    MD5

    28b98a4bf4da3dcd6eb08b7f740f171e

    SHA1

    0476f9b0b1cf67920c51e3f0d29d80d170a127f0

    SHA256

    6b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a

    SHA512

    7fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Lw0ER79.exe

    Filesize

    1.3MB

    MD5

    93b98bc4519a169bf93b3f2a4b7c820a

    SHA1

    79bd66a4873e57a9a83ce9ef82aae60c707be37c

    SHA256

    ddbf0b1885b90124c5ffba10dff3e66a658ba4a6d93a2f6b0f42b854c3715445

    SHA512

    21cafa460392cec822e7be7b17a01a7de5f3c724e7c1a45720e781fa8aa2d7e818f676c5dd26450a3e712f5db121379dab59d8afeaef0435a6ab02a8c812fe8e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Lw0ER79.exe

    Filesize

    1.3MB

    MD5

    93b98bc4519a169bf93b3f2a4b7c820a

    SHA1

    79bd66a4873e57a9a83ce9ef82aae60c707be37c

    SHA256

    ddbf0b1885b90124c5ffba10dff3e66a658ba4a6d93a2f6b0f42b854c3715445

    SHA512

    21cafa460392cec822e7be7b17a01a7de5f3c724e7c1a45720e781fa8aa2d7e818f676c5dd26450a3e712f5db121379dab59d8afeaef0435a6ab02a8c812fe8e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\mF5Kk81.exe

    Filesize

    895KB

    MD5

    ac9b9aafc5582ad1b5ef589e0d5379df

    SHA1

    d777d83b130e962fafd2bfe22c72e31858181d53

    SHA256

    6e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22

    SHA512

    ce2fb8326b12ad2253bcc6d9a81868629c2cd4695bbccc20f9bd90db9892af3dc9611faa620418cf0576ed18376356c19535c00e6ef1138faa7c974072c20bf1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\mF5Kk81.exe

    Filesize

    895KB

    MD5

    ac9b9aafc5582ad1b5ef589e0d5379df

    SHA1

    d777d83b130e962fafd2bfe22c72e31858181d53

    SHA256

    6e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22

    SHA512

    ce2fb8326b12ad2253bcc6d9a81868629c2cd4695bbccc20f9bd90db9892af3dc9611faa620418cf0576ed18376356c19535c00e6ef1138faa7c974072c20bf1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\mh2sA12.exe

    Filesize

    533KB

    MD5

    28b98a4bf4da3dcd6eb08b7f740f171e

    SHA1

    0476f9b0b1cf67920c51e3f0d29d80d170a127f0

    SHA256

    6b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a

    SHA512

    7fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\mh2sA12.exe

    Filesize

    533KB

    MD5

    28b98a4bf4da3dcd6eb08b7f740f171e

    SHA1

    0476f9b0b1cf67920c51e3f0d29d80d170a127f0

    SHA256

    6b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a

    SHA512

    7fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1jB69uQ4.exe

    Filesize

    232KB

    MD5

    3ff825411b1fe07e712a5dcae34f80eb

    SHA1

    e3e4358cabfa74d6e36e26754b01ed78434a6877

    SHA256

    69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

    SHA512

    325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

  • memory/2772-42-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2772-45-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2772-49-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2772-47-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2772-44-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2772-43-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2772-41-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2772-40-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB