Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22-10-2023 22:21

General

  • Target

    78840cd773186b45404a65332d89f4cd4bf5022bb01b979f5ccbee4cd65f3b39.exe

  • Size

    866KB

  • MD5

    afb4f5ccff1e8a766f9aa47f279857d6

  • SHA1

    b678c003747f88b4f8db3a4430cb17339b13e223

  • SHA256

    78840cd773186b45404a65332d89f4cd4bf5022bb01b979f5ccbee4cd65f3b39

  • SHA512

    32f836ef5886dd0600c37c7b787c1b5bde43e2452d7d2f8ead76965aa5b2dfb089ad157ad2742c9737f05fad06ae7e92c686d84d13f1f1141a7b75bde84530d5

  • SSDEEP

    12288:xMr5y90yzQ8ofuLoaNW8xBIlTRhZw0+fKZeEUfTZIS90duJfgo:8yHcRY2kBqrG0hZe/ZIS96Qh

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78840cd773186b45404a65332d89f4cd4bf5022bb01b979f5ccbee4cd65f3b39.exe
    "C:\Users\Admin\AppData\Local\Temp\78840cd773186b45404a65332d89f4cd4bf5022bb01b979f5ccbee4cd65f3b39.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LN2wp25.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LN2wp25.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\WR4Qa69.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\WR4Qa69.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rL4VY64.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rL4VY64.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bw1xX00.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bw1xX00.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2788
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tq75Dd0.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tq75Dd0.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LN2wp25.exe

    Filesize

    727KB

    MD5

    8e7c0957ea65ee1f303a9a92913c762c

    SHA1

    65b905864566f9679e654728a1c38924ef5ae6e3

    SHA256

    76e24bef00f8d294cc39fee9a10afcc1fe25455eec5a8fc236f77a505e31dfd4

    SHA512

    d5dcd6b237ce1c34dfef08c795b6e7e763fdfdbdd9fbb660038e39448490b1745ad3e1431f13214e238cf6d6c7e0e5dc821d3c5458726bc71f93975c93e3cd91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LN2wp25.exe

    Filesize

    727KB

    MD5

    8e7c0957ea65ee1f303a9a92913c762c

    SHA1

    65b905864566f9679e654728a1c38924ef5ae6e3

    SHA256

    76e24bef00f8d294cc39fee9a10afcc1fe25455eec5a8fc236f77a505e31dfd4

    SHA512

    d5dcd6b237ce1c34dfef08c795b6e7e763fdfdbdd9fbb660038e39448490b1745ad3e1431f13214e238cf6d6c7e0e5dc821d3c5458726bc71f93975c93e3cd91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\WR4Qa69.exe

    Filesize

    545KB

    MD5

    a80ac681e56556319517c35671ba272f

    SHA1

    8692ce8d09d75696a66405d96b8c1c37d113a2bd

    SHA256

    be63235867b1da2f8f3e30af410fba3943d4f08d6f5aedf7c9a7416bc9f75c2b

    SHA512

    633da122e23699b8c1aaf16e6cc639575fa889efb252396d7f174d36516f64f2deb51de1c0b90127609a09d5b79cb5e72806641e0190b07f7828a684f0017935

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\WR4Qa69.exe

    Filesize

    545KB

    MD5

    a80ac681e56556319517c35671ba272f

    SHA1

    8692ce8d09d75696a66405d96b8c1c37d113a2bd

    SHA256

    be63235867b1da2f8f3e30af410fba3943d4f08d6f5aedf7c9a7416bc9f75c2b

    SHA512

    633da122e23699b8c1aaf16e6cc639575fa889efb252396d7f174d36516f64f2deb51de1c0b90127609a09d5b79cb5e72806641e0190b07f7828a684f0017935

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rL4VY64.exe

    Filesize

    371KB

    MD5

    08e859e625ab899da7bb674f9512b872

    SHA1

    23c641c4fdda72344b6f1310b80c5614704ffa1f

    SHA256

    c9c5ec4980fd352bda39b182d003fa90a4082e6fca78296553020d3a16e871ec

    SHA512

    cee09458a365d9970147e327df9505deed1e664734df149f09ca446dcc1fb8580c161fa28123b976d456c3cc4f78e7ed6a21dbd8e918a644f039c0a06f408d70

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rL4VY64.exe

    Filesize

    371KB

    MD5

    08e859e625ab899da7bb674f9512b872

    SHA1

    23c641c4fdda72344b6f1310b80c5614704ffa1f

    SHA256

    c9c5ec4980fd352bda39b182d003fa90a4082e6fca78296553020d3a16e871ec

    SHA512

    cee09458a365d9970147e327df9505deed1e664734df149f09ca446dcc1fb8580c161fa28123b976d456c3cc4f78e7ed6a21dbd8e918a644f039c0a06f408d70

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bw1xX00.exe

    Filesize

    246KB

    MD5

    9601d2f0c6fb26b8545f1dca010d63a8

    SHA1

    54e6dbce7d8d19f7b802ae006030108485bdbcd6

    SHA256

    a0103548bafb70e5de4804dfeed7aaeb8520075dda1e9cd6dabc0a831285c15a

    SHA512

    6e5efe494279bbbdcbc2c4f0c3cc4fd999200e614a0951cbf7f8207c223715bdb0f680b235be242199e59578aa2b89e220948391b0056e7621e829c38baa4d0f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bw1xX00.exe

    Filesize

    246KB

    MD5

    9601d2f0c6fb26b8545f1dca010d63a8

    SHA1

    54e6dbce7d8d19f7b802ae006030108485bdbcd6

    SHA256

    a0103548bafb70e5de4804dfeed7aaeb8520075dda1e9cd6dabc0a831285c15a

    SHA512

    6e5efe494279bbbdcbc2c4f0c3cc4fd999200e614a0951cbf7f8207c223715bdb0f680b235be242199e59578aa2b89e220948391b0056e7621e829c38baa4d0f

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tq75Dd0.exe

    Filesize

    11KB

    MD5

    22b50c95b39cbbdb00d5a4cd3d4886bd

    SHA1

    db8326c4fad0064ce3020226e8556e7cce8ce04e

    SHA256

    160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1

    SHA512

    d53e872e03aac73cea2399170a0de74611496c0364ece1d81b8e7591aecc470edc57db63586ceda4bc82589e3b8f39668c49464d962e750dc86099736599f9ac

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tq75Dd0.exe

    Filesize

    11KB

    MD5

    22b50c95b39cbbdb00d5a4cd3d4886bd

    SHA1

    db8326c4fad0064ce3020226e8556e7cce8ce04e

    SHA256

    160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1

    SHA512

    d53e872e03aac73cea2399170a0de74611496c0364ece1d81b8e7591aecc470edc57db63586ceda4bc82589e3b8f39668c49464d962e750dc86099736599f9ac

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LN2wp25.exe

    Filesize

    727KB

    MD5

    8e7c0957ea65ee1f303a9a92913c762c

    SHA1

    65b905864566f9679e654728a1c38924ef5ae6e3

    SHA256

    76e24bef00f8d294cc39fee9a10afcc1fe25455eec5a8fc236f77a505e31dfd4

    SHA512

    d5dcd6b237ce1c34dfef08c795b6e7e763fdfdbdd9fbb660038e39448490b1745ad3e1431f13214e238cf6d6c7e0e5dc821d3c5458726bc71f93975c93e3cd91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LN2wp25.exe

    Filesize

    727KB

    MD5

    8e7c0957ea65ee1f303a9a92913c762c

    SHA1

    65b905864566f9679e654728a1c38924ef5ae6e3

    SHA256

    76e24bef00f8d294cc39fee9a10afcc1fe25455eec5a8fc236f77a505e31dfd4

    SHA512

    d5dcd6b237ce1c34dfef08c795b6e7e763fdfdbdd9fbb660038e39448490b1745ad3e1431f13214e238cf6d6c7e0e5dc821d3c5458726bc71f93975c93e3cd91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\WR4Qa69.exe

    Filesize

    545KB

    MD5

    a80ac681e56556319517c35671ba272f

    SHA1

    8692ce8d09d75696a66405d96b8c1c37d113a2bd

    SHA256

    be63235867b1da2f8f3e30af410fba3943d4f08d6f5aedf7c9a7416bc9f75c2b

    SHA512

    633da122e23699b8c1aaf16e6cc639575fa889efb252396d7f174d36516f64f2deb51de1c0b90127609a09d5b79cb5e72806641e0190b07f7828a684f0017935

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\WR4Qa69.exe

    Filesize

    545KB

    MD5

    a80ac681e56556319517c35671ba272f

    SHA1

    8692ce8d09d75696a66405d96b8c1c37d113a2bd

    SHA256

    be63235867b1da2f8f3e30af410fba3943d4f08d6f5aedf7c9a7416bc9f75c2b

    SHA512

    633da122e23699b8c1aaf16e6cc639575fa889efb252396d7f174d36516f64f2deb51de1c0b90127609a09d5b79cb5e72806641e0190b07f7828a684f0017935

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\rL4VY64.exe

    Filesize

    371KB

    MD5

    08e859e625ab899da7bb674f9512b872

    SHA1

    23c641c4fdda72344b6f1310b80c5614704ffa1f

    SHA256

    c9c5ec4980fd352bda39b182d003fa90a4082e6fca78296553020d3a16e871ec

    SHA512

    cee09458a365d9970147e327df9505deed1e664734df149f09ca446dcc1fb8580c161fa28123b976d456c3cc4f78e7ed6a21dbd8e918a644f039c0a06f408d70

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\rL4VY64.exe

    Filesize

    371KB

    MD5

    08e859e625ab899da7bb674f9512b872

    SHA1

    23c641c4fdda72344b6f1310b80c5614704ffa1f

    SHA256

    c9c5ec4980fd352bda39b182d003fa90a4082e6fca78296553020d3a16e871ec

    SHA512

    cee09458a365d9970147e327df9505deed1e664734df149f09ca446dcc1fb8580c161fa28123b976d456c3cc4f78e7ed6a21dbd8e918a644f039c0a06f408d70

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\bw1xX00.exe

    Filesize

    246KB

    MD5

    9601d2f0c6fb26b8545f1dca010d63a8

    SHA1

    54e6dbce7d8d19f7b802ae006030108485bdbcd6

    SHA256

    a0103548bafb70e5de4804dfeed7aaeb8520075dda1e9cd6dabc0a831285c15a

    SHA512

    6e5efe494279bbbdcbc2c4f0c3cc4fd999200e614a0951cbf7f8207c223715bdb0f680b235be242199e59578aa2b89e220948391b0056e7621e829c38baa4d0f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\bw1xX00.exe

    Filesize

    246KB

    MD5

    9601d2f0c6fb26b8545f1dca010d63a8

    SHA1

    54e6dbce7d8d19f7b802ae006030108485bdbcd6

    SHA256

    a0103548bafb70e5de4804dfeed7aaeb8520075dda1e9cd6dabc0a831285c15a

    SHA512

    6e5efe494279bbbdcbc2c4f0c3cc4fd999200e614a0951cbf7f8207c223715bdb0f680b235be242199e59578aa2b89e220948391b0056e7621e829c38baa4d0f

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tq75Dd0.exe

    Filesize

    11KB

    MD5

    22b50c95b39cbbdb00d5a4cd3d4886bd

    SHA1

    db8326c4fad0064ce3020226e8556e7cce8ce04e

    SHA256

    160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1

    SHA512

    d53e872e03aac73cea2399170a0de74611496c0364ece1d81b8e7591aecc470edc57db63586ceda4bc82589e3b8f39668c49464d962e750dc86099736599f9ac

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tq75Dd0.exe

    Filesize

    11KB

    MD5

    22b50c95b39cbbdb00d5a4cd3d4886bd

    SHA1

    db8326c4fad0064ce3020226e8556e7cce8ce04e

    SHA256

    160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1

    SHA512

    d53e872e03aac73cea2399170a0de74611496c0364ece1d81b8e7591aecc470edc57db63586ceda4bc82589e3b8f39668c49464d962e750dc86099736599f9ac

  • memory/2864-50-0x0000000000CB0000-0x0000000000CBA000-memory.dmp

    Filesize

    40KB