Analysis

  • max time kernel
    188s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 18:30

General

  • Target

    70e5ccf5f97fb161dd40dcabd7706170.exe

  • Size

    1.5MB

  • MD5

    70e5ccf5f97fb161dd40dcabd7706170

  • SHA1

    97e3398a2929313c36bd5f2a67936947adebbcdf

  • SHA256

    b2915131a88c812aa5996772388c8b91df69d975303f400aa314e606d1b69d45

  • SHA512

    26052952840ff9892eeee83b44dc1ecd15cfe782712e27aa68bea51392730d6d5f6f382ab7f83066cee4a595643e007470b57ef0f5c4b7fc7d1249e9bce13c39

  • SSDEEP

    24576:2ymsURDNwMevJZtyhG2fAkcjsqC8neA9F/j+O4A0J8oRH67oNmepT/ZRNp:FtURDNw7vvtGfmreASNb9BYcRN

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70e5ccf5f97fb161dd40dcabd7706170.exe
    "C:\Users\Admin\AppData\Local\Temp\70e5ccf5f97fb161dd40dcabd7706170.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za469622.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za469622.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za442826.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za442826.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za726420.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za726420.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4072
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\53410954.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\53410954.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2980
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1484
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u46495463.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u46495463.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4120
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 236
              6⤵
              • Program crash
              PID:4684
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4120 -ip 4120
    1⤵
      PID:956

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za469622.exe

      Filesize

      1.3MB

      MD5

      71d9c367f8b8d2f800bc3a675479d65a

      SHA1

      edc4ba46037e73fcabfe6cb03143bd68bddb1a35

      SHA256

      e8e1d4f62a4a4f762cac3fdd946dfbe1a775177e732d91398175dcd2bc3d85ea

      SHA512

      019e3b2ff883ba6851e11241e9fbeccda4d7163e2a60c2f46ff861852a70bd8bc1fe97621bd84d977160de19e192bf35d99053c9d5e200754930918cdbb30b4a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za469622.exe

      Filesize

      1.3MB

      MD5

      71d9c367f8b8d2f800bc3a675479d65a

      SHA1

      edc4ba46037e73fcabfe6cb03143bd68bddb1a35

      SHA256

      e8e1d4f62a4a4f762cac3fdd946dfbe1a775177e732d91398175dcd2bc3d85ea

      SHA512

      019e3b2ff883ba6851e11241e9fbeccda4d7163e2a60c2f46ff861852a70bd8bc1fe97621bd84d977160de19e192bf35d99053c9d5e200754930918cdbb30b4a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za442826.exe

      Filesize

      862KB

      MD5

      70236a085c373d0f706858b917fdba36

      SHA1

      1f02f085fdede38f33661672da0a4c50394bff37

      SHA256

      b3126403cf879963bf6eedab80761a28c5470aa9e721f7f8d9acf120a27c1a23

      SHA512

      b95ccecc62e14a636cd8730dd282ced754c9b265d88419ab39bd9f22f955bd34108e5f02dcbbcca19172c2384c5e2a3f7b396c0775d70378368c48b4c2e5eb02

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za442826.exe

      Filesize

      862KB

      MD5

      70236a085c373d0f706858b917fdba36

      SHA1

      1f02f085fdede38f33661672da0a4c50394bff37

      SHA256

      b3126403cf879963bf6eedab80761a28c5470aa9e721f7f8d9acf120a27c1a23

      SHA512

      b95ccecc62e14a636cd8730dd282ced754c9b265d88419ab39bd9f22f955bd34108e5f02dcbbcca19172c2384c5e2a3f7b396c0775d70378368c48b4c2e5eb02

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za726420.exe

      Filesize

      680KB

      MD5

      bc985c68259092b3a62462cb76afd3b1

      SHA1

      f27b22a9e8230f4ba335631ad4b0f2dbbf848c17

      SHA256

      18c527666492fe5452aad00d4152cc064190806c200e8de8bca2f00d2433d6b9

      SHA512

      f79329480b5a04278746ddcdb620dcd8de177599ac430187f8269449bf4024e9d811c1f676553e4f7e8b42689371118941069e21ab5da327dbcf3f6512c04fbb

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za726420.exe

      Filesize

      680KB

      MD5

      bc985c68259092b3a62462cb76afd3b1

      SHA1

      f27b22a9e8230f4ba335631ad4b0f2dbbf848c17

      SHA256

      18c527666492fe5452aad00d4152cc064190806c200e8de8bca2f00d2433d6b9

      SHA512

      f79329480b5a04278746ddcdb620dcd8de177599ac430187f8269449bf4024e9d811c1f676553e4f7e8b42689371118941069e21ab5da327dbcf3f6512c04fbb

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\53410954.exe

      Filesize

      302KB

      MD5

      8485ecbf58ac8c854bac1ff96aaf083f

      SHA1

      6006c398081071671042fd4416fd6d9e5595daf4

      SHA256

      7d9ac2b1b7d294ad1381a76dd917d11fe04b0d6c20ff2685b2a21463359e078a

      SHA512

      7f9bb97a02e6cefe628ccce6c00fdf3949c1f2b6f7e487b6170554241359813226a62e781f5d03b7e013532f5d57795849e31fd7f368ca94b1bc12f7facccd5a

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\53410954.exe

      Filesize

      302KB

      MD5

      8485ecbf58ac8c854bac1ff96aaf083f

      SHA1

      6006c398081071671042fd4416fd6d9e5595daf4

      SHA256

      7d9ac2b1b7d294ad1381a76dd917d11fe04b0d6c20ff2685b2a21463359e078a

      SHA512

      7f9bb97a02e6cefe628ccce6c00fdf3949c1f2b6f7e487b6170554241359813226a62e781f5d03b7e013532f5d57795849e31fd7f368ca94b1bc12f7facccd5a

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u46495463.exe

      Filesize

      522KB

      MD5

      6cd347432d8f5b170f09b42cdc8ca06a

      SHA1

      929e6a82aecb4d7dfb1a8a69e9295b4ed477fbe9

      SHA256

      bdbcac67002d9cca89c2cf36264e52f0c388c15745df7284bcd962b7c2406243

      SHA512

      502463f96c42bae118cb85368ff7f4c44158e9b569563815b4ac16337c4bfff3edcc074198c0e48089ace47a324f71e408fd288198894701719f7b48a3030f70

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u46495463.exe

      Filesize

      522KB

      MD5

      6cd347432d8f5b170f09b42cdc8ca06a

      SHA1

      929e6a82aecb4d7dfb1a8a69e9295b4ed477fbe9

      SHA256

      bdbcac67002d9cca89c2cf36264e52f0c388c15745df7284bcd962b7c2406243

      SHA512

      502463f96c42bae118cb85368ff7f4c44158e9b569563815b4ac16337c4bfff3edcc074198c0e48089ace47a324f71e408fd288198894701719f7b48a3030f70

    • C:\Windows\Temp\1.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • memory/1484-2312-0x0000000000040000-0x000000000004A000-memory.dmp

      Filesize

      40KB

    • memory/2980-204-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-218-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-172-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-174-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-176-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-178-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-180-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-182-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-184-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-186-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-188-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-190-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-192-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-196-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-194-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-198-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-200-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-202-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-170-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-206-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-208-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-210-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-212-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-214-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-216-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-166-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-220-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-222-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-224-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-226-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-228-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-2293-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/2980-2294-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/2980-2295-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/2980-2297-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/2980-168-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-165-0x00000000049E0000-0x0000000004A31000-memory.dmp

      Filesize

      324KB

    • memory/2980-164-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/2980-163-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/2980-162-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/2980-161-0x0000000004AE0000-0x0000000005084000-memory.dmp

      Filesize

      5.6MB

    • memory/4120-2315-0x0000000000830000-0x000000000087C000-memory.dmp

      Filesize

      304KB

    • memory/4120-2413-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

      Filesize

      64KB

    • memory/4120-2414-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

      Filesize

      64KB

    • memory/4120-4446-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

      Filesize

      64KB

    • memory/4120-4448-0x0000000000830000-0x000000000087C000-memory.dmp

      Filesize

      304KB

    • memory/4120-4449-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

      Filesize

      64KB

    • memory/4120-4450-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

      Filesize

      64KB

    • memory/4120-4451-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

      Filesize

      64KB

    • memory/4120-4453-0x0000000005710000-0x00000000057A2000-memory.dmp

      Filesize

      584KB

    • memory/4120-4454-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

      Filesize

      64KB