Analysis

  • max time kernel
    275s
  • max time network
    353s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 18:56

General

  • Target

    ac33c2313b97cd499bec59936e01ce637cdd52244b3d3f7347450872b125c703.exe

  • Size

    1.5MB

  • MD5

    b8fd8755689fc39a7837fd229991c7f3

  • SHA1

    7347af99cad99c8859f76939a1cfccd4313dd750

  • SHA256

    ac33c2313b97cd499bec59936e01ce637cdd52244b3d3f7347450872b125c703

  • SHA512

    df2da218a151762c435b88bd3bdab9c0dffa807a622516101f0fd45ab71a2d2b6a25dbc9e4d940a4dc49189a28e1d1146250bc4989586d405adfdecea611de97

  • SSDEEP

    24576:zyJN1QKcmDaQeLE5mstgxabiJB4xoIY1dvjgxYz9LuMXRvKdEwsrMTvK:Gb1QY6I55tUa1odLFcGGEwsrq

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac33c2313b97cd499bec59936e01ce637cdd52244b3d3f7347450872b125c703.exe
    "C:\Users\Admin\AppData\Local\Temp\ac33c2313b97cd499bec59936e01ce637cdd52244b3d3f7347450872b125c703.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za684332.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za684332.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za655194.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za655194.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4604
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za409432.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za409432.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3360
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\45504109.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\45504109.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za684332.exe

    Filesize

    1.3MB

    MD5

    0bb45a8502ab7e104e35cbc187bd91db

    SHA1

    e0640a29d67a04c9458ebf245633785bebb07517

    SHA256

    726a03451ddda3b83eaa108b586042208a7b9307b8c505bd79ab015eefaf7192

    SHA512

    74a56527d4d9aa4f153fee1eb308b8d065897cd44120bc0fccf62dd28a7dcd4f8d76a55cef6f458bb1765ddc64b762437e72c8a57d73b37c8100fa898915ea43

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za684332.exe

    Filesize

    1.3MB

    MD5

    0bb45a8502ab7e104e35cbc187bd91db

    SHA1

    e0640a29d67a04c9458ebf245633785bebb07517

    SHA256

    726a03451ddda3b83eaa108b586042208a7b9307b8c505bd79ab015eefaf7192

    SHA512

    74a56527d4d9aa4f153fee1eb308b8d065897cd44120bc0fccf62dd28a7dcd4f8d76a55cef6f458bb1765ddc64b762437e72c8a57d73b37c8100fa898915ea43

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za655194.exe

    Filesize

    862KB

    MD5

    cae5f2bd6c35bd47c496883c0b3c2515

    SHA1

    a5eb2552def7ad1b4642bbc086bf294dce2faecc

    SHA256

    34883b82ff6d5c30dda37d481b74a083dbff66df15b8854d449a90f550f4e557

    SHA512

    dfb0faed450d3249dbb72ed9e8c4d756ba2ec6fbef80ae019698d4f30f4d5fe6467602b8eda482e2789e389f696f870d908f446e6650f578fb3e413781a8469b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za655194.exe

    Filesize

    862KB

    MD5

    cae5f2bd6c35bd47c496883c0b3c2515

    SHA1

    a5eb2552def7ad1b4642bbc086bf294dce2faecc

    SHA256

    34883b82ff6d5c30dda37d481b74a083dbff66df15b8854d449a90f550f4e557

    SHA512

    dfb0faed450d3249dbb72ed9e8c4d756ba2ec6fbef80ae019698d4f30f4d5fe6467602b8eda482e2789e389f696f870d908f446e6650f578fb3e413781a8469b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za409432.exe

    Filesize

    679KB

    MD5

    a28b2258921ae5d181063699e0e330c0

    SHA1

    4e239a4a20cdcc9c6c6ce52152221b9ca924e274

    SHA256

    e909f71186989f73cac4fdde38fe1d4de2e61c2941e1753b3abeb02fb1eaa090

    SHA512

    de912a0d827a1c96106fcde88da5217a846c84dc7b47a987f8c22ae0ca71920f5775252532794a34dea450285d009f403d12820342af81b6ae1e803fcd0eba8e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za409432.exe

    Filesize

    679KB

    MD5

    a28b2258921ae5d181063699e0e330c0

    SHA1

    4e239a4a20cdcc9c6c6ce52152221b9ca924e274

    SHA256

    e909f71186989f73cac4fdde38fe1d4de2e61c2941e1753b3abeb02fb1eaa090

    SHA512

    de912a0d827a1c96106fcde88da5217a846c84dc7b47a987f8c22ae0ca71920f5775252532794a34dea450285d009f403d12820342af81b6ae1e803fcd0eba8e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\45504109.exe

    Filesize

    301KB

    MD5

    d79fa687fb917634baf80f23fd212b70

    SHA1

    1090d710539b841fca825037d1ece6fe0841a35b

    SHA256

    6cea0c540bb07b9d03f76281b60c13ec624ca6851e9e0e3648cca9cb594a8eac

    SHA512

    f60c8c020c360259faad066d598286d1065b06b4622f61237c4b25cae82b3e583266b40618b72b04c91741219ce65b5a4a43088c1184df1c2b78891bc249647c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\45504109.exe

    Filesize

    301KB

    MD5

    d79fa687fb917634baf80f23fd212b70

    SHA1

    1090d710539b841fca825037d1ece6fe0841a35b

    SHA256

    6cea0c540bb07b9d03f76281b60c13ec624ca6851e9e0e3648cca9cb594a8eac

    SHA512

    f60c8c020c360259faad066d598286d1065b06b4622f61237c4b25cae82b3e583266b40618b72b04c91741219ce65b5a4a43088c1184df1c2b78891bc249647c

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/3020-161-0x00000000049F0000-0x0000000004F94000-memory.dmp

    Filesize

    5.6MB

  • memory/3020-162-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/3020-163-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/3020-164-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/3020-165-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-166-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-168-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-170-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-172-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-174-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-176-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-178-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-180-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-182-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-184-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-186-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-188-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-190-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-192-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-194-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-196-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-198-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-200-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-202-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-206-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-204-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-208-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-210-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-212-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-214-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-216-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-218-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-220-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-222-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-224-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-226-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-228-0x0000000004FE0000-0x0000000005031000-memory.dmp

    Filesize

    324KB

  • memory/3020-2294-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/3020-2293-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/3020-2295-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/3020-2296-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/3020-2298-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB