Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2023 22:21

General

  • Target

    816d4fd6ca3b5dcba1a2a355e5198f413aae21af5d8e53bff74b02e59345f9c9.exe

  • Size

    1002KB

  • MD5

    2ba0dd909834cf4c4eb4e3a94b17b149

  • SHA1

    7e0f8c499a6a567abb1a0d003300ba90ca7f373b

  • SHA256

    816d4fd6ca3b5dcba1a2a355e5198f413aae21af5d8e53bff74b02e59345f9c9

  • SHA512

    9dd65989c4e26d40b949d9cf280c2d1291d05ac6326d2e0160d86fe14ff5d1bc3f7814c1d0547cda106cbf44fa3a2ce813bd44259ac4f910d8ec261a8f8ded04

  • SSDEEP

    24576:9y3jr1ELLw03ZJWFEmT2m217y6Qzt8KO7i:Y3/GLLbJyEmT2mEyLZ7k

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • .NET Reactor proctector 19 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\816d4fd6ca3b5dcba1a2a355e5198f413aae21af5d8e53bff74b02e59345f9c9.exe
    "C:\Users\Admin\AppData\Local\Temp\816d4fd6ca3b5dcba1a2a355e5198f413aae21af5d8e53bff74b02e59345f9c9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cu4Ao98.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cu4Ao98.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Dk1iX71.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Dk1iX71.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iG5cU40.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iG5cU40.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2144
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cu4Ao98.exe

    Filesize

    863KB

    MD5

    114b264fcbafebb60aa6f9015677d38c

    SHA1

    a2a005661072fe4add56be92c23b8e5a61444d4a

    SHA256

    5dc0edffbeecf7b2efcc8aef83dbe2169fdb5d433544e7a7c036a55c10a7f535

    SHA512

    78c6de23ff145731ff84d041f8be1415431aae5ea7adbcd3c4266947998c80fb6c22bd1af51b02ecd6c481bf3331c7ca7f2f3efa61ed672e3493f2fb5bd09196

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cu4Ao98.exe

    Filesize

    863KB

    MD5

    114b264fcbafebb60aa6f9015677d38c

    SHA1

    a2a005661072fe4add56be92c23b8e5a61444d4a

    SHA256

    5dc0edffbeecf7b2efcc8aef83dbe2169fdb5d433544e7a7c036a55c10a7f535

    SHA512

    78c6de23ff145731ff84d041f8be1415431aae5ea7adbcd3c4266947998c80fb6c22bd1af51b02ecd6c481bf3331c7ca7f2f3efa61ed672e3493f2fb5bd09196

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Dk1iX71.exe

    Filesize

    629KB

    MD5

    c626fec8c4e728828c1d037fc1c99d01

    SHA1

    d8aba4cc654c927314d3fb144bc2de277147f412

    SHA256

    523747f865e57bf80bc9dab45a118a846e3362f1a6675c33e4e165790ddc791b

    SHA512

    3ab5f2ed2797c320dfb7dc5e5d95d750a821d6fe7a46b90ae19b9d4b74ec4cebb45f8fd29f7a4cfc2585bfa5283a2af9c179b55c742a123fa2cd71dc9e6c8ad3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Dk1iX71.exe

    Filesize

    629KB

    MD5

    c626fec8c4e728828c1d037fc1c99d01

    SHA1

    d8aba4cc654c927314d3fb144bc2de277147f412

    SHA256

    523747f865e57bf80bc9dab45a118a846e3362f1a6675c33e4e165790ddc791b

    SHA512

    3ab5f2ed2797c320dfb7dc5e5d95d750a821d6fe7a46b90ae19b9d4b74ec4cebb45f8fd29f7a4cfc2585bfa5283a2af9c179b55c742a123fa2cd71dc9e6c8ad3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iG5cU40.exe

    Filesize

    444KB

    MD5

    7ed0c93698e8bef0a0d594884c6ac85a

    SHA1

    bf02a5fc4a918a8c7c18c146909eb6b386df47c3

    SHA256

    2dee5de62828a5b382c2e9d80cb8174499a00b3b057a6130d59066194f361066

    SHA512

    2877736157244db8b3e13ebc6bd047479b8e61fa2c55db0c982322cfa1fcf810c4b68124a9fc67e8a1fb8a8cd0b6c9ebee6a158f38fa2ee3c49665fcd36a45dc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iG5cU40.exe

    Filesize

    444KB

    MD5

    7ed0c93698e8bef0a0d594884c6ac85a

    SHA1

    bf02a5fc4a918a8c7c18c146909eb6b386df47c3

    SHA256

    2dee5de62828a5b382c2e9d80cb8174499a00b3b057a6130d59066194f361066

    SHA512

    2877736157244db8b3e13ebc6bd047479b8e61fa2c55db0c982322cfa1fcf810c4b68124a9fc67e8a1fb8a8cd0b6c9ebee6a158f38fa2ee3c49665fcd36a45dc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe

    Filesize

    306KB

    MD5

    cffbf89be9b8ebbba9a11ea60f0be22e

    SHA1

    86269fe003ca2411781daf149ea2d8b91503c663

    SHA256

    824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62

    SHA512

    3690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe

    Filesize

    306KB

    MD5

    cffbf89be9b8ebbba9a11ea60f0be22e

    SHA1

    86269fe003ca2411781daf149ea2d8b91503c663

    SHA256

    824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62

    SHA512

    3690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe

    Filesize

    306KB

    MD5

    cffbf89be9b8ebbba9a11ea60f0be22e

    SHA1

    86269fe003ca2411781daf149ea2d8b91503c663

    SHA256

    824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62

    SHA512

    3690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\cu4Ao98.exe

    Filesize

    863KB

    MD5

    114b264fcbafebb60aa6f9015677d38c

    SHA1

    a2a005661072fe4add56be92c23b8e5a61444d4a

    SHA256

    5dc0edffbeecf7b2efcc8aef83dbe2169fdb5d433544e7a7c036a55c10a7f535

    SHA512

    78c6de23ff145731ff84d041f8be1415431aae5ea7adbcd3c4266947998c80fb6c22bd1af51b02ecd6c481bf3331c7ca7f2f3efa61ed672e3493f2fb5bd09196

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\cu4Ao98.exe

    Filesize

    863KB

    MD5

    114b264fcbafebb60aa6f9015677d38c

    SHA1

    a2a005661072fe4add56be92c23b8e5a61444d4a

    SHA256

    5dc0edffbeecf7b2efcc8aef83dbe2169fdb5d433544e7a7c036a55c10a7f535

    SHA512

    78c6de23ff145731ff84d041f8be1415431aae5ea7adbcd3c4266947998c80fb6c22bd1af51b02ecd6c481bf3331c7ca7f2f3efa61ed672e3493f2fb5bd09196

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Dk1iX71.exe

    Filesize

    629KB

    MD5

    c626fec8c4e728828c1d037fc1c99d01

    SHA1

    d8aba4cc654c927314d3fb144bc2de277147f412

    SHA256

    523747f865e57bf80bc9dab45a118a846e3362f1a6675c33e4e165790ddc791b

    SHA512

    3ab5f2ed2797c320dfb7dc5e5d95d750a821d6fe7a46b90ae19b9d4b74ec4cebb45f8fd29f7a4cfc2585bfa5283a2af9c179b55c742a123fa2cd71dc9e6c8ad3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Dk1iX71.exe

    Filesize

    629KB

    MD5

    c626fec8c4e728828c1d037fc1c99d01

    SHA1

    d8aba4cc654c927314d3fb144bc2de277147f412

    SHA256

    523747f865e57bf80bc9dab45a118a846e3362f1a6675c33e4e165790ddc791b

    SHA512

    3ab5f2ed2797c320dfb7dc5e5d95d750a821d6fe7a46b90ae19b9d4b74ec4cebb45f8fd29f7a4cfc2585bfa5283a2af9c179b55c742a123fa2cd71dc9e6c8ad3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\iG5cU40.exe

    Filesize

    444KB

    MD5

    7ed0c93698e8bef0a0d594884c6ac85a

    SHA1

    bf02a5fc4a918a8c7c18c146909eb6b386df47c3

    SHA256

    2dee5de62828a5b382c2e9d80cb8174499a00b3b057a6130d59066194f361066

    SHA512

    2877736157244db8b3e13ebc6bd047479b8e61fa2c55db0c982322cfa1fcf810c4b68124a9fc67e8a1fb8a8cd0b6c9ebee6a158f38fa2ee3c49665fcd36a45dc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\iG5cU40.exe

    Filesize

    444KB

    MD5

    7ed0c93698e8bef0a0d594884c6ac85a

    SHA1

    bf02a5fc4a918a8c7c18c146909eb6b386df47c3

    SHA256

    2dee5de62828a5b382c2e9d80cb8174499a00b3b057a6130d59066194f361066

    SHA512

    2877736157244db8b3e13ebc6bd047479b8e61fa2c55db0c982322cfa1fcf810c4b68124a9fc67e8a1fb8a8cd0b6c9ebee6a158f38fa2ee3c49665fcd36a45dc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe

    Filesize

    306KB

    MD5

    cffbf89be9b8ebbba9a11ea60f0be22e

    SHA1

    86269fe003ca2411781daf149ea2d8b91503c663

    SHA256

    824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62

    SHA512

    3690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe

    Filesize

    306KB

    MD5

    cffbf89be9b8ebbba9a11ea60f0be22e

    SHA1

    86269fe003ca2411781daf149ea2d8b91503c663

    SHA256

    824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62

    SHA512

    3690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe

    Filesize

    306KB

    MD5

    cffbf89be9b8ebbba9a11ea60f0be22e

    SHA1

    86269fe003ca2411781daf149ea2d8b91503c663

    SHA256

    824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62

    SHA512

    3690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe

    Filesize

    306KB

    MD5

    cffbf89be9b8ebbba9a11ea60f0be22e

    SHA1

    86269fe003ca2411781daf149ea2d8b91503c663

    SHA256

    824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62

    SHA512

    3690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe

    Filesize

    306KB

    MD5

    cffbf89be9b8ebbba9a11ea60f0be22e

    SHA1

    86269fe003ca2411781daf149ea2d8b91503c663

    SHA256

    824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62

    SHA512

    3690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe

    Filesize

    306KB

    MD5

    cffbf89be9b8ebbba9a11ea60f0be22e

    SHA1

    86269fe003ca2411781daf149ea2d8b91503c663

    SHA256

    824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62

    SHA512

    3690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1El01FQ8.exe

    Filesize

    306KB

    MD5

    cffbf89be9b8ebbba9a11ea60f0be22e

    SHA1

    86269fe003ca2411781daf149ea2d8b91503c663

    SHA256

    824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62

    SHA512

    3690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273

  • memory/2144-49-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-73-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-47-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-53-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-51-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-46-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-45-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-44-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-57-0x0000000000200000-0x0000000000220000-memory.dmp

    Filesize

    128KB

  • memory/2144-43-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2144-59-0x0000000000250000-0x000000000026E000-memory.dmp

    Filesize

    120KB

  • memory/2144-61-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-67-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-48-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2144-79-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-89-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-91-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-87-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-85-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-83-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-81-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-77-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-75-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-71-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-69-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-65-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-63-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB

  • memory/2144-60-0x0000000000250000-0x0000000000268000-memory.dmp

    Filesize

    96KB