Analysis
-
max time kernel
242s -
max time network
331s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 00:50
Static task
static1
Behavioral task
behavioral1
Sample
32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe
Resource
win10v2004-20230221-en
General
-
Target
32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe
-
Size
1.5MB
-
MD5
65b13e169f898e5444ecffde1309e249
-
SHA1
b798e8028534b7c2e75821d142573c97f812dc63
-
SHA256
32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f
-
SHA512
b983c142cef82bac5f136b299e2f82bf41964f24f3f3bf63ccda41d61421121ecdfbe261dabb735421a02fd1049c382bb355f74cf60026d40a4a174e465e7e0f
-
SSDEEP
24576:2y7pxIKmUw/brSmrHnwltG08ut+7ceTyvBgsJVDP+XeRez3Gpngs3kTTI0T:FoKm/Smjn2tVRt+7HUusLDP+XeRez3AQ
Malware Config
Signatures
-
Processes:
1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
12247662.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 12247662.exe -
Executes dropped EXE 6 IoCs
Processes:
za479011.exeza316238.exeza762296.exe12247662.exe1.exeu11786798.exepid process 228 za479011.exe 3452 za316238.exe 4080 za762296.exe 4880 12247662.exe 3308 1.exe 4824 u11786798.exe -
Processes:
1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exeza479011.exeza316238.exeza762296.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za479011.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za479011.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za316238.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za316238.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za762296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" za762296.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2232 4824 WerFault.exe u11786798.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1.exepid process 3308 1.exe 3308 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
12247662.exe1.exeu11786798.exedescription pid process Token: SeDebugPrivilege 4880 12247662.exe Token: SeDebugPrivilege 3308 1.exe Token: SeDebugPrivilege 4824 u11786798.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exeza479011.exeza316238.exeza762296.exe12247662.exedescription pid process target process PID 756 wrote to memory of 228 756 32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe za479011.exe PID 756 wrote to memory of 228 756 32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe za479011.exe PID 756 wrote to memory of 228 756 32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe za479011.exe PID 228 wrote to memory of 3452 228 za479011.exe za316238.exe PID 228 wrote to memory of 3452 228 za479011.exe za316238.exe PID 228 wrote to memory of 3452 228 za479011.exe za316238.exe PID 3452 wrote to memory of 4080 3452 za316238.exe za762296.exe PID 3452 wrote to memory of 4080 3452 za316238.exe za762296.exe PID 3452 wrote to memory of 4080 3452 za316238.exe za762296.exe PID 4080 wrote to memory of 4880 4080 za762296.exe 12247662.exe PID 4080 wrote to memory of 4880 4080 za762296.exe 12247662.exe PID 4080 wrote to memory of 4880 4080 za762296.exe 12247662.exe PID 4880 wrote to memory of 3308 4880 12247662.exe 1.exe PID 4880 wrote to memory of 3308 4880 12247662.exe 1.exe PID 4080 wrote to memory of 4824 4080 za762296.exe u11786798.exe PID 4080 wrote to memory of 4824 4080 za762296.exe u11786798.exe PID 4080 wrote to memory of 4824 4080 za762296.exe u11786798.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe"C:\Users\Admin\AppData\Local\Temp\32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 12166⤵
- Program crash
PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4824 -ip 48241⤵PID:1344
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exeFilesize
1.3MB
MD5ba98eb05499fcf9a748bbb77dbbcb87c
SHA1c7ec5808b85544dfe340b348b5b55dc2501b4f21
SHA2562385a61193517a60cdebd2141df727d6ba45d84e9a88639e463b356396bb9c53
SHA51288c35a65f5ee523fdf56c4b2c54e086963b93ef03a5d96e89b1b5b81af3698c70b8ab48fd8f6b5b1aaeb78da8ffd03ecafe7e582013532b2f053b2f211128c8b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exeFilesize
1.3MB
MD5ba98eb05499fcf9a748bbb77dbbcb87c
SHA1c7ec5808b85544dfe340b348b5b55dc2501b4f21
SHA2562385a61193517a60cdebd2141df727d6ba45d84e9a88639e463b356396bb9c53
SHA51288c35a65f5ee523fdf56c4b2c54e086963b93ef03a5d96e89b1b5b81af3698c70b8ab48fd8f6b5b1aaeb78da8ffd03ecafe7e582013532b2f053b2f211128c8b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exeFilesize
882KB
MD502bda9e1cdb60296a707a8938d884868
SHA1fba7fbcfd486fb0c66bc578afe6b5982816ac931
SHA256a29249363a2bf634856a0974db31e07784717cdc74e8ee787b8cd033c4199e0b
SHA512a710a1b5015f2fbf0bcd231aec2a83e599c6558c797dbcf602bca4d769c0fa37d6a692249c0d0f8a1631f23277e0f4b80ce395e202c93c27f003392670f3beee
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exeFilesize
882KB
MD502bda9e1cdb60296a707a8938d884868
SHA1fba7fbcfd486fb0c66bc578afe6b5982816ac931
SHA256a29249363a2bf634856a0974db31e07784717cdc74e8ee787b8cd033c4199e0b
SHA512a710a1b5015f2fbf0bcd231aec2a83e599c6558c797dbcf602bca4d769c0fa37d6a692249c0d0f8a1631f23277e0f4b80ce395e202c93c27f003392670f3beee
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exeFilesize
699KB
MD572dc75548f7e7a524947cc2e2c8bc0e9
SHA14446291f6a0946ea4aaf89b18aafbdfb9898dc76
SHA256d486ecd0d5814b5e0f4a514dddf29a8edae0fa1039b2efd5fcd527acb054a572
SHA512f6fb02a2aeb4587afe344a72eeb2787ea41f65afe8048c7955dd5a605e6aa42f115578d6abc4a79df4c345efb7ed9336f792c1a4a68773b6f709bb939c7d4e25
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exeFilesize
699KB
MD572dc75548f7e7a524947cc2e2c8bc0e9
SHA14446291f6a0946ea4aaf89b18aafbdfb9898dc76
SHA256d486ecd0d5814b5e0f4a514dddf29a8edae0fa1039b2efd5fcd527acb054a572
SHA512f6fb02a2aeb4587afe344a72eeb2787ea41f65afe8048c7955dd5a605e6aa42f115578d6abc4a79df4c345efb7ed9336f792c1a4a68773b6f709bb939c7d4e25
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exeFilesize
300KB
MD52cfa51eeb3060859f56fac3e0c6e5129
SHA163e3d66ec2e8adc73e8378296ed18b72933c4c05
SHA25688e503380143e16d664f5fa02b889f4981b6bdebce0153ccc9d1e1769667e33c
SHA512135590b4a406a92101b98365ca1e71254053e2e43ef97441ab462e41e068828a2872c91422b73599a6b8e7a7a52e30a823bbd440406b0405397d9aebe4a4f4a7
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exeFilesize
300KB
MD52cfa51eeb3060859f56fac3e0c6e5129
SHA163e3d66ec2e8adc73e8378296ed18b72933c4c05
SHA25688e503380143e16d664f5fa02b889f4981b6bdebce0153ccc9d1e1769667e33c
SHA512135590b4a406a92101b98365ca1e71254053e2e43ef97441ab462e41e068828a2872c91422b73599a6b8e7a7a52e30a823bbd440406b0405397d9aebe4a4f4a7
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exeFilesize
479KB
MD56b31fdc616a44d09caa86e411c2b4af2
SHA1ed74cafc8a35cd2a396f72011cf0a22422c254cc
SHA2565f589066ded585671af2e60bf3979743df853041d3f853ccbe36daba88cf6b2e
SHA51229544f07ddc370ec1d057316fc76933e868501be282568e3270d883f72a20a27680087506ca3b285c8b87990c48b7865be7fe0a900e1bb7542b16787a67782f6
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exeFilesize
479KB
MD56b31fdc616a44d09caa86e411c2b4af2
SHA1ed74cafc8a35cd2a396f72011cf0a22422c254cc
SHA2565f589066ded585671af2e60bf3979743df853041d3f853ccbe36daba88cf6b2e
SHA51229544f07ddc370ec1d057316fc76933e868501be282568e3270d883f72a20a27680087506ca3b285c8b87990c48b7865be7fe0a900e1bb7542b16787a67782f6
-
C:\Windows\Temp\1.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Windows\Temp\1.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Windows\Temp\1.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
memory/3308-2313-0x0000000000720000-0x000000000072A000-memory.dmpFilesize
40KB
-
memory/4824-4452-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/4824-2612-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/4824-2611-0x0000000000860000-0x00000000008AC000-memory.dmpFilesize
304KB
-
memory/4824-2614-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/4824-4448-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/4824-4449-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/4824-4450-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/4824-4454-0x0000000004D70000-0x0000000004D80000-memory.dmpFilesize
64KB
-
memory/4824-4457-0x00000000059E0000-0x0000000005A72000-memory.dmpFilesize
584KB
-
memory/4880-205-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-229-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-191-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-193-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-195-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-197-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-199-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-201-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-203-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-187-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-207-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-209-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-211-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-213-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-215-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-217-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-219-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-221-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-223-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-225-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-227-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-189-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-2294-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4880-2295-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4880-2296-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4880-2298-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4880-185-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-2306-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4880-183-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-181-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-179-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-177-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-175-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-173-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-171-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-166-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-169-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-167-0x00000000049B0000-0x0000000004A01000-memory.dmpFilesize
324KB
-
memory/4880-165-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4880-164-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4880-163-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/4880-162-0x0000000004AE0000-0x0000000005084000-memory.dmpFilesize
5.6MB