Analysis

  • max time kernel
    264s
  • max time network
    304s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 20:38

General

  • Target

    fde8913b557481103c3766b75a452c9b83250ae6986065c6133a39e5bbd87a12.exe

  • Size

    1.7MB

  • MD5

    8fbb89d444b4949a2f2e60b18ad9f48b

  • SHA1

    2d46c23b0b8975c7e8b31e8d57890881652e0b32

  • SHA256

    fde8913b557481103c3766b75a452c9b83250ae6986065c6133a39e5bbd87a12

  • SHA512

    3a4424c6345a361e8e9b7855dbb1c22720167f4687ccabed13369838b81f4c2af95a1554a524745e9eb2067fbe812ece984d08f55a850ea8b5609c603da17bee

  • SSDEEP

    24576:myj4w3M9+KmS8dETCUFtQYL2fX7aP3CUKkR+E2NIERq3DybEKAUnZMndgjPI:1k+29ymCGtdL0raakYvNIDDtFGMndg

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fde8913b557481103c3766b75a452c9b83250ae6986065c6133a39e5bbd87a12.exe
    "C:\Users\Admin\AppData\Local\Temp\fde8913b557481103c3766b75a452c9b83250ae6986065c6133a39e5bbd87a12.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xs471227.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xs471227.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fT542701.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fT542701.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ez192666.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ez192666.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1020
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vL310352.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vL310352.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4876
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a88402544.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a88402544.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4272
              • C:\Windows\Temp\1.exe
                "C:\Windows\Temp\1.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4864
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b61090795.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b61090795.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xs471227.exe

    Filesize

    1.4MB

    MD5

    5318e032094ef6f2665f8aba0f6d1e8f

    SHA1

    a5158a228f93e56d8dd2a5b136df5dc130ee0337

    SHA256

    0025b6e7ec75b2c04d062316987f4975ec27382004add4f221581bb1138c686a

    SHA512

    7396b67dc72f4e0ea584af1f76a0f6121a0503e59515d69a8204de8596e889504277e415c2fe1edf2dde54e50f112c422b41789c24fc5684f5e5edc7bcd36eb1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xs471227.exe

    Filesize

    1.4MB

    MD5

    5318e032094ef6f2665f8aba0f6d1e8f

    SHA1

    a5158a228f93e56d8dd2a5b136df5dc130ee0337

    SHA256

    0025b6e7ec75b2c04d062316987f4975ec27382004add4f221581bb1138c686a

    SHA512

    7396b67dc72f4e0ea584af1f76a0f6121a0503e59515d69a8204de8596e889504277e415c2fe1edf2dde54e50f112c422b41789c24fc5684f5e5edc7bcd36eb1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fT542701.exe

    Filesize

    1.3MB

    MD5

    c551909e73ace60d1611d306e7d739b4

    SHA1

    5f9c02e83cc19732014c1bcd9712b6e4a7afa0c1

    SHA256

    ca4046284b63fc61b8dbc6816d8669d51f8a9b6ded9d9c7233064a8cba343619

    SHA512

    e7f83b92742a5ce33e88444eb552a21cb6eccb651a6106807b03fc5731f9b40cbef22255665bd276968cf0526ebf927f12b14f90e1910a58c2f0f00130109717

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fT542701.exe

    Filesize

    1.3MB

    MD5

    c551909e73ace60d1611d306e7d739b4

    SHA1

    5f9c02e83cc19732014c1bcd9712b6e4a7afa0c1

    SHA256

    ca4046284b63fc61b8dbc6816d8669d51f8a9b6ded9d9c7233064a8cba343619

    SHA512

    e7f83b92742a5ce33e88444eb552a21cb6eccb651a6106807b03fc5731f9b40cbef22255665bd276968cf0526ebf927f12b14f90e1910a58c2f0f00130109717

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ez192666.exe

    Filesize

    851KB

    MD5

    ee409180af2f55bab9fc99286c5e3b82

    SHA1

    75bdfd7613eb77afbc81f23bfd322efd1d87ed0b

    SHA256

    4db93b8d3454563e669dd38d2561cfdfd5fea3fad96fecec6f014ec29d31c461

    SHA512

    ece13305dbc78fbfa67a51b02fe6b155c4173849659af9b312c3eab015053b97fa274bc144a7efae6d175d234cef2cd82f44dd2a748d02d30746e85b104aa5cb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ez192666.exe

    Filesize

    851KB

    MD5

    ee409180af2f55bab9fc99286c5e3b82

    SHA1

    75bdfd7613eb77afbc81f23bfd322efd1d87ed0b

    SHA256

    4db93b8d3454563e669dd38d2561cfdfd5fea3fad96fecec6f014ec29d31c461

    SHA512

    ece13305dbc78fbfa67a51b02fe6b155c4173849659af9b312c3eab015053b97fa274bc144a7efae6d175d234cef2cd82f44dd2a748d02d30746e85b104aa5cb

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vL310352.exe

    Filesize

    680KB

    MD5

    8a55f21ea84ce97908039802b1abf43d

    SHA1

    751e67a95496d8e27822c3444f16dd730decf4d4

    SHA256

    1bb410d560a769ac4e054e8e5c57d971aa1f4b5dd1c12a053b8165ac134cb39c

    SHA512

    88ff9b24768c03232e498961f753a928de71d0de7b4cb8be8db93cb80df16300ef0da3b212485bfe4df467e4ae39200be78287511fdad890f2b20c218e5f0ff6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vL310352.exe

    Filesize

    680KB

    MD5

    8a55f21ea84ce97908039802b1abf43d

    SHA1

    751e67a95496d8e27822c3444f16dd730decf4d4

    SHA256

    1bb410d560a769ac4e054e8e5c57d971aa1f4b5dd1c12a053b8165ac134cb39c

    SHA512

    88ff9b24768c03232e498961f753a928de71d0de7b4cb8be8db93cb80df16300ef0da3b212485bfe4df467e4ae39200be78287511fdad890f2b20c218e5f0ff6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a88402544.exe

    Filesize

    301KB

    MD5

    b41124f1be000027abdf3e5f2216d3d7

    SHA1

    2ca94c4eba5ef3399f0a2a1d717db449d9ed06c1

    SHA256

    61b81f0094734d51856d772f334b6dfe73b0769010adf518b205ecf74a0968fa

    SHA512

    98256673e553fe685bdb13a376b90dcdebdba5f00066ed8399a0d44ff912249206e814ff52e7ec3c84094fcf6eccc5a9265747188e09afb6c55e052f886e3fb6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a88402544.exe

    Filesize

    301KB

    MD5

    b41124f1be000027abdf3e5f2216d3d7

    SHA1

    2ca94c4eba5ef3399f0a2a1d717db449d9ed06c1

    SHA256

    61b81f0094734d51856d772f334b6dfe73b0769010adf518b205ecf74a0968fa

    SHA512

    98256673e553fe685bdb13a376b90dcdebdba5f00066ed8399a0d44ff912249206e814ff52e7ec3c84094fcf6eccc5a9265747188e09afb6c55e052f886e3fb6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b61090795.exe

    Filesize

    522KB

    MD5

    d00d3a2fd81fc276ebf4ef28e366f0c3

    SHA1

    62a2c46a092020678c6f75e4c427aa19ca9eeb19

    SHA256

    46e06547c2cfcb645590e73b7b2f079b3fa2d0dedeb25c0b828ccb91f529f800

    SHA512

    62b6c71e5670a554416ce18d5e804fd8b8e4351203b978ffc2087a069aaf88b93d89485683babba943fe15b55858814a71fdd90d746cd2a37d7df6509fa297d0

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b61090795.exe

    Filesize

    522KB

    MD5

    d00d3a2fd81fc276ebf4ef28e366f0c3

    SHA1

    62a2c46a092020678c6f75e4c427aa19ca9eeb19

    SHA256

    46e06547c2cfcb645590e73b7b2f079b3fa2d0dedeb25c0b828ccb91f529f800

    SHA512

    62b6c71e5670a554416ce18d5e804fd8b8e4351203b978ffc2087a069aaf88b93d89485683babba943fe15b55858814a71fdd90d746cd2a37d7df6509fa297d0

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/4272-197-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-213-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-171-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/4272-172-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/4272-173-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/4272-174-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-175-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-177-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-179-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-181-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-183-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-187-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-185-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-189-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-191-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-193-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-195-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-169-0x0000000004B80000-0x0000000005124000-memory.dmp

    Filesize

    5.6MB

  • memory/4272-199-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-201-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-203-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-205-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-207-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-209-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-211-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-170-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/4272-215-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-217-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-219-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-221-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-223-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-225-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-227-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-229-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-231-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-168-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/4272-233-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-235-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-237-0x0000000004AF0000-0x0000000004B41000-memory.dmp

    Filesize

    324KB

  • memory/4272-2302-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/4416-2375-0x0000000000880000-0x00000000008CC000-memory.dmp

    Filesize

    304KB

  • memory/4416-2377-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/4416-2379-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/4416-4451-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/4416-4453-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/4416-4454-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/4416-4455-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/4416-4456-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/4416-4460-0x00000000059F0000-0x0000000005A82000-memory.dmp

    Filesize

    584KB

  • memory/4864-2318-0x0000000000D20000-0x0000000000D2A000-memory.dmp

    Filesize

    40KB