Analysis

  • max time kernel
    408s
  • max time network
    476s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 19:41

General

  • Target

    cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe

  • Size

    1.5MB

  • MD5

    b0cc5316c4796d64dd84e557d2caaa3e

  • SHA1

    bfae5803b10f6d4b35928e06561bffdd73c211d8

  • SHA256

    cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9

  • SHA512

    696185294f94b916c551908d3bfc95e8dbec50e158f8d70e30effa550549a7939ef80ff9b6e393969087bd8bc10c3a34a3b07a9c3a27771b0a46a3a00f2ecffc

  • SSDEEP

    24576:hyhbx1EWlTJkjDD6F+c0UFabZAqGaFYhRSy7cr05Uo67hNmeHKy2/8jVw299QP:UhbPJkjDDm+HiKYGy74yyYk2EhwB

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe
    "C:\Users\Admin\AppData\Local\Temp\cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za646197.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za646197.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za864273.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za864273.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3804
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za543096.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za543096.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3292
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\62236771.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\62236771.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1332
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u58519083.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u58519083.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za646197.exe

    Filesize

    1.3MB

    MD5

    ea530a7bb1a954c13a62e5a61aad7c0f

    SHA1

    29d9ee80d16fa59927d45f83b2eabf90a42c6f0f

    SHA256

    421c57a0979d24f14e4c6e054445c66cc0e5a7c34625c2edf28d606ad7d9adcd

    SHA512

    8debbea35b218588370007e2d9f6c56e5bb175aa5fdab371db96df517ab60bbe7b7c969b6e9ad447fb8c209034b7eabfd8051c1d00a6e0ebb1b82658caadbe70

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za646197.exe

    Filesize

    1.3MB

    MD5

    ea530a7bb1a954c13a62e5a61aad7c0f

    SHA1

    29d9ee80d16fa59927d45f83b2eabf90a42c6f0f

    SHA256

    421c57a0979d24f14e4c6e054445c66cc0e5a7c34625c2edf28d606ad7d9adcd

    SHA512

    8debbea35b218588370007e2d9f6c56e5bb175aa5fdab371db96df517ab60bbe7b7c969b6e9ad447fb8c209034b7eabfd8051c1d00a6e0ebb1b82658caadbe70

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za864273.exe

    Filesize

    862KB

    MD5

    9e40f6f89bbb6db225a00603e36f36bf

    SHA1

    97846f93171b7cd0e557870ef7f81df29feec497

    SHA256

    0a2d81db9e0cf909683949bcf32d59d3576ed439bc3c774aea665b77b965be21

    SHA512

    92b961ee9db6b4ca2a208e12d4a1ec61b102a2c3df3b0ddc06b8543707113b86dcd1f5d0a0c671b4965d7e4a6dd6b8292936fbefa3dccb1da46d192ecaa18a54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za864273.exe

    Filesize

    862KB

    MD5

    9e40f6f89bbb6db225a00603e36f36bf

    SHA1

    97846f93171b7cd0e557870ef7f81df29feec497

    SHA256

    0a2d81db9e0cf909683949bcf32d59d3576ed439bc3c774aea665b77b965be21

    SHA512

    92b961ee9db6b4ca2a208e12d4a1ec61b102a2c3df3b0ddc06b8543707113b86dcd1f5d0a0c671b4965d7e4a6dd6b8292936fbefa3dccb1da46d192ecaa18a54

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za543096.exe

    Filesize

    680KB

    MD5

    51347b77c412ddea77374a2ae493d772

    SHA1

    a7a412620309a392228b3b00e4477de8bfee6420

    SHA256

    cd55b83d88b694cb0e67313e1f16dbeed8ee5263af7f9c08e0c471b6f468da85

    SHA512

    185194302ebad53714863ded076175d80f830934c3c1851d3316ec4daa3ddbe3e89f18fafb6cea96fcc69afedb0341d46d570d78a3652a927baac1988561e202

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za543096.exe

    Filesize

    680KB

    MD5

    51347b77c412ddea77374a2ae493d772

    SHA1

    a7a412620309a392228b3b00e4477de8bfee6420

    SHA256

    cd55b83d88b694cb0e67313e1f16dbeed8ee5263af7f9c08e0c471b6f468da85

    SHA512

    185194302ebad53714863ded076175d80f830934c3c1851d3316ec4daa3ddbe3e89f18fafb6cea96fcc69afedb0341d46d570d78a3652a927baac1988561e202

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\62236771.exe

    Filesize

    302KB

    MD5

    cebb0ee5d72100b82138cfab0f82a355

    SHA1

    c8cff32c73fc58c33dc79773ca1867da7119936d

    SHA256

    6afc41e8d21b0b874eba8db8f069ded7f46531f561dbcf9e97037f82a4370612

    SHA512

    14f32b16f227243da3506eccd9a299092e41b23fa0fb1b2b4471f56276e908b99c28c1b56c4e453a2b1788eb2ccd0174cfca210472381d1e9dcb6d34dfb79cf9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\62236771.exe

    Filesize

    302KB

    MD5

    cebb0ee5d72100b82138cfab0f82a355

    SHA1

    c8cff32c73fc58c33dc79773ca1867da7119936d

    SHA256

    6afc41e8d21b0b874eba8db8f069ded7f46531f561dbcf9e97037f82a4370612

    SHA512

    14f32b16f227243da3506eccd9a299092e41b23fa0fb1b2b4471f56276e908b99c28c1b56c4e453a2b1788eb2ccd0174cfca210472381d1e9dcb6d34dfb79cf9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u58519083.exe

    Filesize

    522KB

    MD5

    b755c0e228562779905332169357e939

    SHA1

    309d3b4c272db3ba25e38a096638bcb92709f6c9

    SHA256

    b6e737b86226ec94f2fdd705688b79a7042c534e276e8934ced2e12e29c86d02

    SHA512

    5adba143dbf0ce746a3cd5135b4da50fce9abe80ef5aabf8fc1c00321a87fe9722c83add5fe6a9a0b6d58cabeff1192783d16d76c681d7bc4fcfe0fb0f3ceaaf

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u58519083.exe

    Filesize

    522KB

    MD5

    b755c0e228562779905332169357e939

    SHA1

    309d3b4c272db3ba25e38a096638bcb92709f6c9

    SHA256

    b6e737b86226ec94f2fdd705688b79a7042c534e276e8934ced2e12e29c86d02

    SHA512

    5adba143dbf0ce746a3cd5135b4da50fce9abe80ef5aabf8fc1c00321a87fe9722c83add5fe6a9a0b6d58cabeff1192783d16d76c681d7bc4fcfe0fb0f3ceaaf

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/1332-194-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-210-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-163-0x0000000004B00000-0x0000000004B10000-memory.dmp

    Filesize

    64KB

  • memory/1332-164-0x0000000004B00000-0x0000000004B10000-memory.dmp

    Filesize

    64KB

  • memory/1332-165-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-166-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-168-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-172-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-170-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-174-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-176-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-178-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-180-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-182-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-184-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-186-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-188-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-190-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-192-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-161-0x0000000004B10000-0x00000000050B4000-memory.dmp

    Filesize

    5.6MB

  • memory/1332-196-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-198-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-200-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-202-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-204-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-206-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-208-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-162-0x0000000004B00000-0x0000000004B10000-memory.dmp

    Filesize

    64KB

  • memory/1332-212-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-214-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-216-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-218-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-220-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-222-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-224-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-226-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-228-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1332-1439-0x0000000004B00000-0x0000000004B10000-memory.dmp

    Filesize

    64KB

  • memory/1332-1440-0x0000000004B00000-0x0000000004B10000-memory.dmp

    Filesize

    64KB

  • memory/1332-1443-0x0000000004B00000-0x0000000004B10000-memory.dmp

    Filesize

    64KB

  • memory/1332-2297-0x0000000004B00000-0x0000000004B10000-memory.dmp

    Filesize

    64KB

  • memory/1332-2298-0x0000000004B00000-0x0000000004B10000-memory.dmp

    Filesize

    64KB

  • memory/2316-2316-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2316-2315-0x0000000000830000-0x000000000087C000-memory.dmp

    Filesize

    304KB

  • memory/2316-2319-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2316-2321-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2316-4447-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2316-4449-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2316-4450-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2316-4451-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2316-4452-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2316-4455-0x00000000059F0000-0x0000000005A82000-memory.dmp

    Filesize

    584KB

  • memory/4720-2311-0x0000000000C70000-0x0000000000C7A000-memory.dmp

    Filesize

    40KB