Analysis

  • max time kernel
    266s
  • max time network
    358s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:19

General

  • Target

    67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe

  • Size

    1.5MB

  • MD5

    06eb386180d6cc1935db80f136a11f04

  • SHA1

    ddac8724a355740963396195a32c5c8d85fb6274

  • SHA256

    67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365

  • SHA512

    1ccf44ef5f2c07f48c17a9769d9cd72dd8e0b3c25c212ad46ff7ea424749fee8ab7822567a286b72f5bddb87970631dccc1c8846c24fe60935a9833894936d2c

  • SSDEEP

    24576:PyrvUijL5YUnpdt0ZNk3t4I2d/ueBN9eiD8hrCQBvMEcReZTF5Gjs3kH4nEOMpQD:arv1jL5YUpTuN+tlOueBNc75vMEcReZl

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe
    "C:\Users\Admin\AppData\Local\Temp\67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Li824575.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Li824575.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pp984960.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pp984960.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TR799775.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TR799775.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4724
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\176807278.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\176807278.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1848
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3192
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\289252017.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\289252017.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Li824575.exe

    Filesize

    1.3MB

    MD5

    8e1907fb69fcd02ecc75561454c485d5

    SHA1

    ca4c280ab8d7f4c9fb099cae650f15c4d868dd3f

    SHA256

    b0aaeb36e8c5a238c5bfe43e1beaa03e3c32b1748a9e63217274dc73ae080ca8

    SHA512

    3961ce1be5c8b83d30860a75bc96409d4f48ab7b637f4c7bb1b0dbe846b7d70aca1b3518143f57fb1889bd00cf051e43d6bc2d395fce0ba696789f0c441309fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Li824575.exe

    Filesize

    1.3MB

    MD5

    8e1907fb69fcd02ecc75561454c485d5

    SHA1

    ca4c280ab8d7f4c9fb099cae650f15c4d868dd3f

    SHA256

    b0aaeb36e8c5a238c5bfe43e1beaa03e3c32b1748a9e63217274dc73ae080ca8

    SHA512

    3961ce1be5c8b83d30860a75bc96409d4f48ab7b637f4c7bb1b0dbe846b7d70aca1b3518143f57fb1889bd00cf051e43d6bc2d395fce0ba696789f0c441309fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pp984960.exe

    Filesize

    871KB

    MD5

    582eb9f88f85b08cd247f31be5eebc6c

    SHA1

    086384151fa4ffb34ec6dfa56165739645e5976c

    SHA256

    e6685e74a022cbb25dd69003e8705cf9fa296d1ca0dfa83dae37d6a3d71c2ee7

    SHA512

    0db78e36d821d77260314abaec6f281b07dd0f35818646978569cadc4ac981c91de89b0e920d4875d53831d8a96005a6717c5cc00cf84eded206225da3077f9b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pp984960.exe

    Filesize

    871KB

    MD5

    582eb9f88f85b08cd247f31be5eebc6c

    SHA1

    086384151fa4ffb34ec6dfa56165739645e5976c

    SHA256

    e6685e74a022cbb25dd69003e8705cf9fa296d1ca0dfa83dae37d6a3d71c2ee7

    SHA512

    0db78e36d821d77260314abaec6f281b07dd0f35818646978569cadc4ac981c91de89b0e920d4875d53831d8a96005a6717c5cc00cf84eded206225da3077f9b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TR799775.exe

    Filesize

    700KB

    MD5

    40f4a9521d97abc6ff28062a9ec11707

    SHA1

    fb2102fbd15ace3889e559d114e9d18304452aa9

    SHA256

    2961b561e5fc8f51e51a56552173fd6770dc046d93bc48a5c6183b66f6274c65

    SHA512

    d68e72802bbbadc31684bd000d51cf2f9de777f9a82c586dc08a499d46c7d3e2f2d305cf97570839c5423e3c6276c20236efa5c4dd8edd9c07c32e092106f095

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TR799775.exe

    Filesize

    700KB

    MD5

    40f4a9521d97abc6ff28062a9ec11707

    SHA1

    fb2102fbd15ace3889e559d114e9d18304452aa9

    SHA256

    2961b561e5fc8f51e51a56552173fd6770dc046d93bc48a5c6183b66f6274c65

    SHA512

    d68e72802bbbadc31684bd000d51cf2f9de777f9a82c586dc08a499d46c7d3e2f2d305cf97570839c5423e3c6276c20236efa5c4dd8edd9c07c32e092106f095

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\176807278.exe

    Filesize

    300KB

    MD5

    50e65c6a0da3120534f802d2b2b67b2a

    SHA1

    f168a3991abbd34b6bf87ef29f4e6cb14fa3ec9d

    SHA256

    869604acc5691e0d5e3182d34187b4b948cd9286e5e45ffcedde96fdd5d01b98

    SHA512

    fc32926c8bebcc62d5b38ac933cbad3e40ac76bc319d05fcc08f4f47e987d63a0fa6d43fb02e3e553789b58796a9c537e72068b18457d75b30b658f78415c10f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\176807278.exe

    Filesize

    300KB

    MD5

    50e65c6a0da3120534f802d2b2b67b2a

    SHA1

    f168a3991abbd34b6bf87ef29f4e6cb14fa3ec9d

    SHA256

    869604acc5691e0d5e3182d34187b4b948cd9286e5e45ffcedde96fdd5d01b98

    SHA512

    fc32926c8bebcc62d5b38ac933cbad3e40ac76bc319d05fcc08f4f47e987d63a0fa6d43fb02e3e553789b58796a9c537e72068b18457d75b30b658f78415c10f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\289252017.exe

    Filesize

    479KB

    MD5

    b65d59c4177622423c250638b87cdc39

    SHA1

    779611b640fb9643520ba8c2a51e6216391c3d36

    SHA256

    e5c6f829a8f9e55ba625eb07be2c2624173b0ffa452b9f8f06e5c7317746f6de

    SHA512

    b648b32f8903b655f102b9084fd02fbc8c609150a097e00e20ce31388b15ffbf79714631ab9c69acff65982e6c18897750f2e82c6a2c9bb8f2ff892043d08400

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\289252017.exe

    Filesize

    479KB

    MD5

    b65d59c4177622423c250638b87cdc39

    SHA1

    779611b640fb9643520ba8c2a51e6216391c3d36

    SHA256

    e5c6f829a8f9e55ba625eb07be2c2624173b0ffa452b9f8f06e5c7317746f6de

    SHA512

    b648b32f8903b655f102b9084fd02fbc8c609150a097e00e20ce31388b15ffbf79714631ab9c69acff65982e6c18897750f2e82c6a2c9bb8f2ff892043d08400

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/1848-204-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-216-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-173-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-175-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-177-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-179-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-181-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-183-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-185-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-187-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-189-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1848-190-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-192-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1848-196-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-198-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-200-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-194-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1848-202-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-193-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-169-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-206-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-208-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-210-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-212-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-214-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-171-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-218-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-220-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-222-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-224-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-226-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-228-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-2293-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1848-2294-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1848-2295-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1848-2299-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1848-167-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-165-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-163-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-162-0x00000000049B0000-0x0000000004A01000-memory.dmp

    Filesize

    324KB

  • memory/1848-161-0x0000000004A60000-0x0000000005004000-memory.dmp

    Filesize

    5.6MB

  • memory/3192-2312-0x0000000000DB0000-0x0000000000DBA000-memory.dmp

    Filesize

    40KB

  • memory/3812-2314-0x00000000008F0000-0x000000000093C000-memory.dmp

    Filesize

    304KB

  • memory/3812-2609-0x0000000002A20000-0x0000000002A30000-memory.dmp

    Filesize

    64KB

  • memory/3812-2611-0x0000000002A20000-0x0000000002A30000-memory.dmp

    Filesize

    64KB

  • memory/3812-4446-0x0000000002A20000-0x0000000002A30000-memory.dmp

    Filesize

    64KB

  • memory/3812-4447-0x00000000008F0000-0x000000000093C000-memory.dmp

    Filesize

    304KB

  • memory/3812-4448-0x0000000002A20000-0x0000000002A30000-memory.dmp

    Filesize

    64KB

  • memory/3812-4449-0x0000000002A20000-0x0000000002A30000-memory.dmp

    Filesize

    64KB

  • memory/3812-4450-0x0000000002A20000-0x0000000002A30000-memory.dmp

    Filesize

    64KB

  • memory/3812-4453-0x0000000002A20000-0x0000000002A30000-memory.dmp

    Filesize

    64KB

  • memory/3812-4456-0x0000000004DE0000-0x0000000004E72000-memory.dmp

    Filesize

    584KB