Analysis

  • max time kernel
    242s
  • max time network
    331s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2023 00:50

General

  • Target

    32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe

  • Size

    1.5MB

  • MD5

    65b13e169f898e5444ecffde1309e249

  • SHA1

    b798e8028534b7c2e75821d142573c97f812dc63

  • SHA256

    32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f

  • SHA512

    b983c142cef82bac5f136b299e2f82bf41964f24f3f3bf63ccda41d61421121ecdfbe261dabb735421a02fd1049c382bb355f74cf60026d40a4a174e465e7e0f

  • SSDEEP

    24576:2y7pxIKmUw/brSmrHnwltG08ut+7ceTyvBgsJVDP+XeRez3Gpngs3kTTI0T:FoKm/Smjn2tVRt+7HUusLDP+XeRez3AQ

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe
    "C:\Users\Admin\AppData\Local\Temp\32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3452
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4080
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4880
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3308
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4824
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 1216
              6⤵
              • Program crash
              PID:2232
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4824 -ip 4824
    1⤵
      PID:1344

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exe
      Filesize

      1.3MB

      MD5

      ba98eb05499fcf9a748bbb77dbbcb87c

      SHA1

      c7ec5808b85544dfe340b348b5b55dc2501b4f21

      SHA256

      2385a61193517a60cdebd2141df727d6ba45d84e9a88639e463b356396bb9c53

      SHA512

      88c35a65f5ee523fdf56c4b2c54e086963b93ef03a5d96e89b1b5b81af3698c70b8ab48fd8f6b5b1aaeb78da8ffd03ecafe7e582013532b2f053b2f211128c8b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exe
      Filesize

      1.3MB

      MD5

      ba98eb05499fcf9a748bbb77dbbcb87c

      SHA1

      c7ec5808b85544dfe340b348b5b55dc2501b4f21

      SHA256

      2385a61193517a60cdebd2141df727d6ba45d84e9a88639e463b356396bb9c53

      SHA512

      88c35a65f5ee523fdf56c4b2c54e086963b93ef03a5d96e89b1b5b81af3698c70b8ab48fd8f6b5b1aaeb78da8ffd03ecafe7e582013532b2f053b2f211128c8b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exe
      Filesize

      882KB

      MD5

      02bda9e1cdb60296a707a8938d884868

      SHA1

      fba7fbcfd486fb0c66bc578afe6b5982816ac931

      SHA256

      a29249363a2bf634856a0974db31e07784717cdc74e8ee787b8cd033c4199e0b

      SHA512

      a710a1b5015f2fbf0bcd231aec2a83e599c6558c797dbcf602bca4d769c0fa37d6a692249c0d0f8a1631f23277e0f4b80ce395e202c93c27f003392670f3beee

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exe
      Filesize

      882KB

      MD5

      02bda9e1cdb60296a707a8938d884868

      SHA1

      fba7fbcfd486fb0c66bc578afe6b5982816ac931

      SHA256

      a29249363a2bf634856a0974db31e07784717cdc74e8ee787b8cd033c4199e0b

      SHA512

      a710a1b5015f2fbf0bcd231aec2a83e599c6558c797dbcf602bca4d769c0fa37d6a692249c0d0f8a1631f23277e0f4b80ce395e202c93c27f003392670f3beee

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exe
      Filesize

      699KB

      MD5

      72dc75548f7e7a524947cc2e2c8bc0e9

      SHA1

      4446291f6a0946ea4aaf89b18aafbdfb9898dc76

      SHA256

      d486ecd0d5814b5e0f4a514dddf29a8edae0fa1039b2efd5fcd527acb054a572

      SHA512

      f6fb02a2aeb4587afe344a72eeb2787ea41f65afe8048c7955dd5a605e6aa42f115578d6abc4a79df4c345efb7ed9336f792c1a4a68773b6f709bb939c7d4e25

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exe
      Filesize

      699KB

      MD5

      72dc75548f7e7a524947cc2e2c8bc0e9

      SHA1

      4446291f6a0946ea4aaf89b18aafbdfb9898dc76

      SHA256

      d486ecd0d5814b5e0f4a514dddf29a8edae0fa1039b2efd5fcd527acb054a572

      SHA512

      f6fb02a2aeb4587afe344a72eeb2787ea41f65afe8048c7955dd5a605e6aa42f115578d6abc4a79df4c345efb7ed9336f792c1a4a68773b6f709bb939c7d4e25

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exe
      Filesize

      300KB

      MD5

      2cfa51eeb3060859f56fac3e0c6e5129

      SHA1

      63e3d66ec2e8adc73e8378296ed18b72933c4c05

      SHA256

      88e503380143e16d664f5fa02b889f4981b6bdebce0153ccc9d1e1769667e33c

      SHA512

      135590b4a406a92101b98365ca1e71254053e2e43ef97441ab462e41e068828a2872c91422b73599a6b8e7a7a52e30a823bbd440406b0405397d9aebe4a4f4a7

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exe
      Filesize

      300KB

      MD5

      2cfa51eeb3060859f56fac3e0c6e5129

      SHA1

      63e3d66ec2e8adc73e8378296ed18b72933c4c05

      SHA256

      88e503380143e16d664f5fa02b889f4981b6bdebce0153ccc9d1e1769667e33c

      SHA512

      135590b4a406a92101b98365ca1e71254053e2e43ef97441ab462e41e068828a2872c91422b73599a6b8e7a7a52e30a823bbd440406b0405397d9aebe4a4f4a7

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exe
      Filesize

      479KB

      MD5

      6b31fdc616a44d09caa86e411c2b4af2

      SHA1

      ed74cafc8a35cd2a396f72011cf0a22422c254cc

      SHA256

      5f589066ded585671af2e60bf3979743df853041d3f853ccbe36daba88cf6b2e

      SHA512

      29544f07ddc370ec1d057316fc76933e868501be282568e3270d883f72a20a27680087506ca3b285c8b87990c48b7865be7fe0a900e1bb7542b16787a67782f6

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exe
      Filesize

      479KB

      MD5

      6b31fdc616a44d09caa86e411c2b4af2

      SHA1

      ed74cafc8a35cd2a396f72011cf0a22422c254cc

      SHA256

      5f589066ded585671af2e60bf3979743df853041d3f853ccbe36daba88cf6b2e

      SHA512

      29544f07ddc370ec1d057316fc76933e868501be282568e3270d883f72a20a27680087506ca3b285c8b87990c48b7865be7fe0a900e1bb7542b16787a67782f6

    • C:\Windows\Temp\1.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • memory/3308-2313-0x0000000000720000-0x000000000072A000-memory.dmp
      Filesize

      40KB

    • memory/4824-4452-0x0000000004D70000-0x0000000004D80000-memory.dmp
      Filesize

      64KB

    • memory/4824-2612-0x0000000004D70000-0x0000000004D80000-memory.dmp
      Filesize

      64KB

    • memory/4824-2611-0x0000000000860000-0x00000000008AC000-memory.dmp
      Filesize

      304KB

    • memory/4824-2614-0x0000000004D70000-0x0000000004D80000-memory.dmp
      Filesize

      64KB

    • memory/4824-4448-0x0000000004D70000-0x0000000004D80000-memory.dmp
      Filesize

      64KB

    • memory/4824-4449-0x0000000004D70000-0x0000000004D80000-memory.dmp
      Filesize

      64KB

    • memory/4824-4450-0x0000000004D70000-0x0000000004D80000-memory.dmp
      Filesize

      64KB

    • memory/4824-4454-0x0000000004D70000-0x0000000004D80000-memory.dmp
      Filesize

      64KB

    • memory/4824-4457-0x00000000059E0000-0x0000000005A72000-memory.dmp
      Filesize

      584KB

    • memory/4880-205-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-229-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-191-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-193-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-195-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-197-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-199-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-201-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-203-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-187-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-207-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-209-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-211-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-213-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-215-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-217-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-219-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-221-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-223-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-225-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-227-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-189-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-2294-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/4880-2295-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/4880-2296-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/4880-2298-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/4880-185-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-2306-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/4880-183-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-181-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-179-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-177-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-175-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-173-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-171-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-166-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-169-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-167-0x00000000049B0000-0x0000000004A01000-memory.dmp
      Filesize

      324KB

    • memory/4880-165-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/4880-164-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/4880-163-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/4880-162-0x0000000004AE0000-0x0000000005084000-memory.dmp
      Filesize

      5.6MB