Analysis
-
max time kernel
254s -
max time network
264s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:10
Static task
static1
Behavioral task
behavioral1
Sample
5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exe
Resource
win10v2004-20230221-en
General
-
Target
5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exe
-
Size
1.5MB
-
MD5
8731c06d82151140786abe45d8fcd511
-
SHA1
816870c22ac765c1166eb3ebeac650c32ca3f905
-
SHA256
5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd
-
SHA512
5ad403fbc54d8cd7db8f3c31cda42134a6e2a528a2028c9c219a0326577230289dc559ff3287606a64558616927c2032c82a5e4d86ea9d31de0d2c1b306553b8
-
SSDEEP
24576:2yIw586H0RiXHdQ7tfYe0PdAatS72pw0UpJ4xzeRcectW9HEJFpl:Fz586H0Ri3dKtQRq57JzpWxzfdIdS
Malware Config
Signatures
-
Processes:
1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
25795473.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 25795473.exe -
Executes dropped EXE 6 IoCs
Processes:
za483883.exeza045173.exeza656711.exe25795473.exe1.exeu23854298.exepid process 2188 za483883.exe 4820 za045173.exe 264 za656711.exe 4660 25795473.exe 1164 1.exe 2816 u23854298.exe -
Processes:
1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
za045173.exeza656711.exe5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exeza483883.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za045173.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za656711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" za656711.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za483883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za483883.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za045173.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1.exepid process 1164 1.exe 1164 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
25795473.exeu23854298.exe1.exedescription pid process Token: SeDebugPrivilege 4660 25795473.exe Token: SeDebugPrivilege 2816 u23854298.exe Token: SeDebugPrivilege 1164 1.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exeza483883.exeza045173.exeza656711.exe25795473.exedescription pid process target process PID 1692 wrote to memory of 2188 1692 5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exe za483883.exe PID 1692 wrote to memory of 2188 1692 5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exe za483883.exe PID 1692 wrote to memory of 2188 1692 5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exe za483883.exe PID 2188 wrote to memory of 4820 2188 za483883.exe za045173.exe PID 2188 wrote to memory of 4820 2188 za483883.exe za045173.exe PID 2188 wrote to memory of 4820 2188 za483883.exe za045173.exe PID 4820 wrote to memory of 264 4820 za045173.exe za656711.exe PID 4820 wrote to memory of 264 4820 za045173.exe za656711.exe PID 4820 wrote to memory of 264 4820 za045173.exe za656711.exe PID 264 wrote to memory of 4660 264 za656711.exe 25795473.exe PID 264 wrote to memory of 4660 264 za656711.exe 25795473.exe PID 264 wrote to memory of 4660 264 za656711.exe 25795473.exe PID 4660 wrote to memory of 1164 4660 25795473.exe 1.exe PID 4660 wrote to memory of 1164 4660 25795473.exe 1.exe PID 264 wrote to memory of 2816 264 za656711.exe u23854298.exe PID 264 wrote to memory of 2816 264 za656711.exe u23854298.exe PID 264 wrote to memory of 2816 264 za656711.exe u23854298.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exe"C:\Users\Admin\AppData\Local\Temp\5fd5e66d752cd871e59f792549b8c0922aa3a668e25ab744f8a82def88d32fbd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za483883.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za483883.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za045173.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za045173.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za656711.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za656711.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\25795473.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\25795473.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u23854298.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u23854298.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za483883.exeFilesize
1.4MB
MD5914c3cafa807ef35a76ceaee33ce90a9
SHA18c0dd9c0ce1142e4edd8c94a2942e4ae3b6f86e7
SHA25695466a4aeb8a7708c8289da905dc7230b99824cbf36930a0894321ade802d848
SHA5129ac60696c782509365498680d64fd3d83126b99cf240c9e598cb18380b9fdd7e561a242afdbf27f07c6163471b3fea19b76c14a750033fd0ea8ba762b2579ca5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za483883.exeFilesize
1.4MB
MD5914c3cafa807ef35a76ceaee33ce90a9
SHA18c0dd9c0ce1142e4edd8c94a2942e4ae3b6f86e7
SHA25695466a4aeb8a7708c8289da905dc7230b99824cbf36930a0894321ade802d848
SHA5129ac60696c782509365498680d64fd3d83126b99cf240c9e598cb18380b9fdd7e561a242afdbf27f07c6163471b3fea19b76c14a750033fd0ea8ba762b2579ca5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za045173.exeFilesize
899KB
MD5074845ab776e75e62b7ad42d44a28808
SHA139d848cd96ebb8c810d3dbff04da2bda18bf7423
SHA25626e6cd1a99bec4397f7806aec397f559fd764a96a3c8a313df4f0cc65681e6c7
SHA512c7cfffde7bcb63c51d88816601c7ea5d34a08f882c71921670100283a88a26e52bb8943041e48b56c5bafb5b77465ada107a5ff63eb09fc5c80ba9bb6c5fd8ec
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za045173.exeFilesize
899KB
MD5074845ab776e75e62b7ad42d44a28808
SHA139d848cd96ebb8c810d3dbff04da2bda18bf7423
SHA25626e6cd1a99bec4397f7806aec397f559fd764a96a3c8a313df4f0cc65681e6c7
SHA512c7cfffde7bcb63c51d88816601c7ea5d34a08f882c71921670100283a88a26e52bb8943041e48b56c5bafb5b77465ada107a5ff63eb09fc5c80ba9bb6c5fd8ec
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za656711.exeFilesize
716KB
MD540f6924c694b96ae870862c33fe6dcb0
SHA15bb901d0cd1d77575c1d8533c41b085e1de45c7e
SHA256597da84478abef70c08ab35715413edfabbb7f1222e13a3c01db86d477e7c2b1
SHA51257cfc5230e892347834d63d50ffaa127d891c11dc1de6ca73b0e84bdf5461f6dcc075792e81b51f2c4c757867548f60a7d5c11c3b76c62c5cb22a23538c18954
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za656711.exeFilesize
716KB
MD540f6924c694b96ae870862c33fe6dcb0
SHA15bb901d0cd1d77575c1d8533c41b085e1de45c7e
SHA256597da84478abef70c08ab35715413edfabbb7f1222e13a3c01db86d477e7c2b1
SHA51257cfc5230e892347834d63d50ffaa127d891c11dc1de6ca73b0e84bdf5461f6dcc075792e81b51f2c4c757867548f60a7d5c11c3b76c62c5cb22a23538c18954
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\25795473.exeFilesize
299KB
MD5daf45ac208b870063629baffd66d7e59
SHA1ef1bcd86b8d3379242817609132d0c5b567143d6
SHA2561282066f63c15be5b6fe21611fcb40d000b6e58321955a287c2e97865898bb6c
SHA512fd430a9c453e525792698daeabd70daeb424e6b0c8d75cb80b5eb35f62e6d92372d139ef80df13b6f2304c50348d576b97128a929a04179081f2247d923b00d3
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\25795473.exeFilesize
299KB
MD5daf45ac208b870063629baffd66d7e59
SHA1ef1bcd86b8d3379242817609132d0c5b567143d6
SHA2561282066f63c15be5b6fe21611fcb40d000b6e58321955a287c2e97865898bb6c
SHA512fd430a9c453e525792698daeabd70daeb424e6b0c8d75cb80b5eb35f62e6d92372d139ef80df13b6f2304c50348d576b97128a929a04179081f2247d923b00d3
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u23854298.exeFilesize
528KB
MD5338e6a8d27a1a8652d2a2f6978ca5b08
SHA13af746dee0c8b834fd95ac7f7fa2b4074d462295
SHA256f5fe4c534fa12aa3c3157763182e91a7891f7dc0876248a09a5cdd4cf9d7edbc
SHA512cd459b2333d81e223722d617b8de522bec2a7ff28197da51568e9c4fe45ffe5415624f531fb31b9f4d3f8ea2747fee7903f61875c95bc5e1ee1e704fc9f6cc7a
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u23854298.exeFilesize
528KB
MD5338e6a8d27a1a8652d2a2f6978ca5b08
SHA13af746dee0c8b834fd95ac7f7fa2b4074d462295
SHA256f5fe4c534fa12aa3c3157763182e91a7891f7dc0876248a09a5cdd4cf9d7edbc
SHA512cd459b2333d81e223722d617b8de522bec2a7ff28197da51568e9c4fe45ffe5415624f531fb31b9f4d3f8ea2747fee7903f61875c95bc5e1ee1e704fc9f6cc7a
-
C:\Windows\Temp\1.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Windows\Temp\1.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Windows\Temp\1.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
memory/1164-2312-0x00000000004F0000-0x00000000004FA000-memory.dmpFilesize
40KB
-
memory/2816-2648-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/2816-2646-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/2816-2644-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/2816-2643-0x00000000009B0000-0x00000000009FC000-memory.dmpFilesize
304KB
-
memory/2816-4446-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/2816-4453-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/2816-4454-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/2816-4455-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/2816-4456-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/2816-4459-0x0000000002370000-0x0000000002402000-memory.dmpFilesize
584KB
-
memory/4660-204-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-2293-0x0000000004A80000-0x0000000004A90000-memory.dmpFilesize
64KB
-
memory/4660-192-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-194-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-196-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-198-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-200-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-202-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-188-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-206-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-208-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-210-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-214-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-212-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-216-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-218-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-220-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-222-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-224-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-228-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-226-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-190-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-2294-0x0000000004A80000-0x0000000004A90000-memory.dmpFilesize
64KB
-
memory/4660-2295-0x0000000004A80000-0x0000000004A90000-memory.dmpFilesize
64KB
-
memory/4660-2296-0x0000000004A80000-0x0000000004A90000-memory.dmpFilesize
64KB
-
memory/4660-186-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-184-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-182-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-180-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-178-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-176-0x0000000004A80000-0x0000000004A90000-memory.dmpFilesize
64KB
-
memory/4660-174-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-175-0x0000000004A80000-0x0000000004A90000-memory.dmpFilesize
64KB
-
memory/4660-173-0x0000000004A80000-0x0000000004A90000-memory.dmpFilesize
64KB
-
memory/4660-171-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-169-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-167-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-165-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-163-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-162-0x00000000049F0000-0x0000000004A41000-memory.dmpFilesize
324KB
-
memory/4660-161-0x0000000004A90000-0x0000000005034000-memory.dmpFilesize
5.6MB