Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 02:18

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    77ea53409cd3cbb2b02ab8f98ca0329b

  • SHA1

    36a3125d8efe9d3f0f0f1329145e9ce894f019b7

  • SHA256

    4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b

  • SHA512

    06f30ceaa0c504f4589b8b9a209a2cf35452af89733fc230e3b2d01a6c15d7a208e2e45a90cafb9bc288ec32cd29d9665196f919c5aab3f369cda97571d3637b

  • SSDEEP

    24576:WyJSoyMQCEgp7EvcxDyV7gK7i+Ce3Dcc9pwodSu+rdjVxrvkx8kY7lIcjiK11tPI:lJJyMXHpgv8y9gw9CezF9qgSu+rRVx71

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp7pq51.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp7pq51.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN4Kh02.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN4Kh02.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Wy3aP92.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Wy3aP92.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2388
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2740
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2820
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2632
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                    PID:3020
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    6⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2748
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 296
                    6⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2688

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp7pq51.exe

          Filesize

          1.1MB

          MD5

          a1e2f2e5fa3baa6a0dca3bb77c227517

          SHA1

          1c1a75381d85cd9be3175cfe8e2299c113c8f38a

          SHA256

          c2ac7f9f9baa03cf766696621347f34c27867850708e4e27fac6dfdeb6d5ba04

          SHA512

          fb27275de82de1985746b9d0f822e57af108051b873961f6bbca708a03e129484105b71c0495b689211d9bc640b4a60eca7648f2cec8235daa8d2fe36c12a863

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp7pq51.exe

          Filesize

          1.1MB

          MD5

          a1e2f2e5fa3baa6a0dca3bb77c227517

          SHA1

          1c1a75381d85cd9be3175cfe8e2299c113c8f38a

          SHA256

          c2ac7f9f9baa03cf766696621347f34c27867850708e4e27fac6dfdeb6d5ba04

          SHA512

          fb27275de82de1985746b9d0f822e57af108051b873961f6bbca708a03e129484105b71c0495b689211d9bc640b4a60eca7648f2cec8235daa8d2fe36c12a863

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN4Kh02.exe

          Filesize

          691KB

          MD5

          0a9dbda1784ce40906cb6e268e4e12a9

          SHA1

          b3968288f2e174f5a566e68ca8e86d5863331e79

          SHA256

          d954bf71808f120b8451d07497aca57df31b692b67768467404a66ac89244e3f

          SHA512

          075406229ab279697336199db5681256e7da33eb955cd470fbd53af564bc367cda6ed47140e49b63c2280403ebc898dd3b59af93ce9b06d1daeba75d00ca2e3e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN4Kh02.exe

          Filesize

          691KB

          MD5

          0a9dbda1784ce40906cb6e268e4e12a9

          SHA1

          b3968288f2e174f5a566e68ca8e86d5863331e79

          SHA256

          d954bf71808f120b8451d07497aca57df31b692b67768467404a66ac89244e3f

          SHA512

          075406229ab279697336199db5681256e7da33eb955cd470fbd53af564bc367cda6ed47140e49b63c2280403ebc898dd3b59af93ce9b06d1daeba75d00ca2e3e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Wy3aP92.exe

          Filesize

          330KB

          MD5

          9c76487d40bbb19823d3462a3d46fbe1

          SHA1

          2c1fb84e4d6a6c3612e9846ce307302ad7e53cd1

          SHA256

          fef640bbe57a9ec330b8d7ce2ba345866166391abf6a1eb3936f4b1044a0cc75

          SHA512

          9891222cae8ec9853cd084ebc109a2cf036444fb0c40a784685d6ec1a2cfabecd71dd02cc3a8edcbc7cab37e684faae20aae5ad6221c8d04e0bfc65292deb8b1

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Wy3aP92.exe

          Filesize

          330KB

          MD5

          9c76487d40bbb19823d3462a3d46fbe1

          SHA1

          2c1fb84e4d6a6c3612e9846ce307302ad7e53cd1

          SHA256

          fef640bbe57a9ec330b8d7ce2ba345866166391abf6a1eb3936f4b1044a0cc75

          SHA512

          9891222cae8ec9853cd084ebc109a2cf036444fb0c40a784685d6ec1a2cfabecd71dd02cc3a8edcbc7cab37e684faae20aae5ad6221c8d04e0bfc65292deb8b1

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp7pq51.exe

          Filesize

          1.1MB

          MD5

          a1e2f2e5fa3baa6a0dca3bb77c227517

          SHA1

          1c1a75381d85cd9be3175cfe8e2299c113c8f38a

          SHA256

          c2ac7f9f9baa03cf766696621347f34c27867850708e4e27fac6dfdeb6d5ba04

          SHA512

          fb27275de82de1985746b9d0f822e57af108051b873961f6bbca708a03e129484105b71c0495b689211d9bc640b4a60eca7648f2cec8235daa8d2fe36c12a863

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp7pq51.exe

          Filesize

          1.1MB

          MD5

          a1e2f2e5fa3baa6a0dca3bb77c227517

          SHA1

          1c1a75381d85cd9be3175cfe8e2299c113c8f38a

          SHA256

          c2ac7f9f9baa03cf766696621347f34c27867850708e4e27fac6dfdeb6d5ba04

          SHA512

          fb27275de82de1985746b9d0f822e57af108051b873961f6bbca708a03e129484105b71c0495b689211d9bc640b4a60eca7648f2cec8235daa8d2fe36c12a863

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\IN4Kh02.exe

          Filesize

          691KB

          MD5

          0a9dbda1784ce40906cb6e268e4e12a9

          SHA1

          b3968288f2e174f5a566e68ca8e86d5863331e79

          SHA256

          d954bf71808f120b8451d07497aca57df31b692b67768467404a66ac89244e3f

          SHA512

          075406229ab279697336199db5681256e7da33eb955cd470fbd53af564bc367cda6ed47140e49b63c2280403ebc898dd3b59af93ce9b06d1daeba75d00ca2e3e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\IN4Kh02.exe

          Filesize

          691KB

          MD5

          0a9dbda1784ce40906cb6e268e4e12a9

          SHA1

          b3968288f2e174f5a566e68ca8e86d5863331e79

          SHA256

          d954bf71808f120b8451d07497aca57df31b692b67768467404a66ac89244e3f

          SHA512

          075406229ab279697336199db5681256e7da33eb955cd470fbd53af564bc367cda6ed47140e49b63c2280403ebc898dd3b59af93ce9b06d1daeba75d00ca2e3e

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Wy3aP92.exe

          Filesize

          330KB

          MD5

          9c76487d40bbb19823d3462a3d46fbe1

          SHA1

          2c1fb84e4d6a6c3612e9846ce307302ad7e53cd1

          SHA256

          fef640bbe57a9ec330b8d7ce2ba345866166391abf6a1eb3936f4b1044a0cc75

          SHA512

          9891222cae8ec9853cd084ebc109a2cf036444fb0c40a784685d6ec1a2cfabecd71dd02cc3a8edcbc7cab37e684faae20aae5ad6221c8d04e0bfc65292deb8b1

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Wy3aP92.exe

          Filesize

          330KB

          MD5

          9c76487d40bbb19823d3462a3d46fbe1

          SHA1

          2c1fb84e4d6a6c3612e9846ce307302ad7e53cd1

          SHA256

          fef640bbe57a9ec330b8d7ce2ba345866166391abf6a1eb3936f4b1044a0cc75

          SHA512

          9891222cae8ec9853cd084ebc109a2cf036444fb0c40a784685d6ec1a2cfabecd71dd02cc3a8edcbc7cab37e684faae20aae5ad6221c8d04e0bfc65292deb8b1

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1by11sz4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • memory/2748-42-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2748-44-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2748-47-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2748-49-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2748-45-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2748-43-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2748-41-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2748-40-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB