Analysis

  • max time kernel
    176s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2023 00:50

General

  • Target

    32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe

  • Size

    1.5MB

  • MD5

    65b13e169f898e5444ecffde1309e249

  • SHA1

    b798e8028534b7c2e75821d142573c97f812dc63

  • SHA256

    32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f

  • SHA512

    b983c142cef82bac5f136b299e2f82bf41964f24f3f3bf63ccda41d61421121ecdfbe261dabb735421a02fd1049c382bb355f74cf60026d40a4a174e465e7e0f

  • SSDEEP

    24576:2y7pxIKmUw/brSmrHnwltG08ut+7ceTyvBgsJVDP+XeRez3Gpngs3kTTI0T:FoKm/Smjn2tVRt+7HUusLDP+XeRez3AQ

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe
    "C:\Users\Admin\AppData\Local\Temp\32468fd9089a4495ebb693876a44e3b58e97e002c31f4b56d096224df733354f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4224
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4784
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4296
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5068
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1248
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 1224
              6⤵
              • Program crash
              PID:3748
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1248 -ip 1248
    1⤵
      PID:4148

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exe
      Filesize

      1.3MB

      MD5

      ba98eb05499fcf9a748bbb77dbbcb87c

      SHA1

      c7ec5808b85544dfe340b348b5b55dc2501b4f21

      SHA256

      2385a61193517a60cdebd2141df727d6ba45d84e9a88639e463b356396bb9c53

      SHA512

      88c35a65f5ee523fdf56c4b2c54e086963b93ef03a5d96e89b1b5b81af3698c70b8ab48fd8f6b5b1aaeb78da8ffd03ecafe7e582013532b2f053b2f211128c8b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za479011.exe
      Filesize

      1.3MB

      MD5

      ba98eb05499fcf9a748bbb77dbbcb87c

      SHA1

      c7ec5808b85544dfe340b348b5b55dc2501b4f21

      SHA256

      2385a61193517a60cdebd2141df727d6ba45d84e9a88639e463b356396bb9c53

      SHA512

      88c35a65f5ee523fdf56c4b2c54e086963b93ef03a5d96e89b1b5b81af3698c70b8ab48fd8f6b5b1aaeb78da8ffd03ecafe7e582013532b2f053b2f211128c8b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exe
      Filesize

      882KB

      MD5

      02bda9e1cdb60296a707a8938d884868

      SHA1

      fba7fbcfd486fb0c66bc578afe6b5982816ac931

      SHA256

      a29249363a2bf634856a0974db31e07784717cdc74e8ee787b8cd033c4199e0b

      SHA512

      a710a1b5015f2fbf0bcd231aec2a83e599c6558c797dbcf602bca4d769c0fa37d6a692249c0d0f8a1631f23277e0f4b80ce395e202c93c27f003392670f3beee

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za316238.exe
      Filesize

      882KB

      MD5

      02bda9e1cdb60296a707a8938d884868

      SHA1

      fba7fbcfd486fb0c66bc578afe6b5982816ac931

      SHA256

      a29249363a2bf634856a0974db31e07784717cdc74e8ee787b8cd033c4199e0b

      SHA512

      a710a1b5015f2fbf0bcd231aec2a83e599c6558c797dbcf602bca4d769c0fa37d6a692249c0d0f8a1631f23277e0f4b80ce395e202c93c27f003392670f3beee

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exe
      Filesize

      699KB

      MD5

      72dc75548f7e7a524947cc2e2c8bc0e9

      SHA1

      4446291f6a0946ea4aaf89b18aafbdfb9898dc76

      SHA256

      d486ecd0d5814b5e0f4a514dddf29a8edae0fa1039b2efd5fcd527acb054a572

      SHA512

      f6fb02a2aeb4587afe344a72eeb2787ea41f65afe8048c7955dd5a605e6aa42f115578d6abc4a79df4c345efb7ed9336f792c1a4a68773b6f709bb939c7d4e25

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za762296.exe
      Filesize

      699KB

      MD5

      72dc75548f7e7a524947cc2e2c8bc0e9

      SHA1

      4446291f6a0946ea4aaf89b18aafbdfb9898dc76

      SHA256

      d486ecd0d5814b5e0f4a514dddf29a8edae0fa1039b2efd5fcd527acb054a572

      SHA512

      f6fb02a2aeb4587afe344a72eeb2787ea41f65afe8048c7955dd5a605e6aa42f115578d6abc4a79df4c345efb7ed9336f792c1a4a68773b6f709bb939c7d4e25

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exe
      Filesize

      300KB

      MD5

      2cfa51eeb3060859f56fac3e0c6e5129

      SHA1

      63e3d66ec2e8adc73e8378296ed18b72933c4c05

      SHA256

      88e503380143e16d664f5fa02b889f4981b6bdebce0153ccc9d1e1769667e33c

      SHA512

      135590b4a406a92101b98365ca1e71254053e2e43ef97441ab462e41e068828a2872c91422b73599a6b8e7a7a52e30a823bbd440406b0405397d9aebe4a4f4a7

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\12247662.exe
      Filesize

      300KB

      MD5

      2cfa51eeb3060859f56fac3e0c6e5129

      SHA1

      63e3d66ec2e8adc73e8378296ed18b72933c4c05

      SHA256

      88e503380143e16d664f5fa02b889f4981b6bdebce0153ccc9d1e1769667e33c

      SHA512

      135590b4a406a92101b98365ca1e71254053e2e43ef97441ab462e41e068828a2872c91422b73599a6b8e7a7a52e30a823bbd440406b0405397d9aebe4a4f4a7

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exe
      Filesize

      479KB

      MD5

      6b31fdc616a44d09caa86e411c2b4af2

      SHA1

      ed74cafc8a35cd2a396f72011cf0a22422c254cc

      SHA256

      5f589066ded585671af2e60bf3979743df853041d3f853ccbe36daba88cf6b2e

      SHA512

      29544f07ddc370ec1d057316fc76933e868501be282568e3270d883f72a20a27680087506ca3b285c8b87990c48b7865be7fe0a900e1bb7542b16787a67782f6

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u11786798.exe
      Filesize

      479KB

      MD5

      6b31fdc616a44d09caa86e411c2b4af2

      SHA1

      ed74cafc8a35cd2a396f72011cf0a22422c254cc

      SHA256

      5f589066ded585671af2e60bf3979743df853041d3f853ccbe36daba88cf6b2e

      SHA512

      29544f07ddc370ec1d057316fc76933e868501be282568e3270d883f72a20a27680087506ca3b285c8b87990c48b7865be7fe0a900e1bb7542b16787a67782f6

    • C:\Windows\Temp\1.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • memory/1248-4450-0x0000000004F30000-0x0000000004F40000-memory.dmp
      Filesize

      64KB

    • memory/1248-4449-0x0000000004F30000-0x0000000004F40000-memory.dmp
      Filesize

      64KB

    • memory/1248-4448-0x0000000004F30000-0x0000000004F40000-memory.dmp
      Filesize

      64KB

    • memory/1248-4447-0x0000000004F30000-0x0000000004F40000-memory.dmp
      Filesize

      64KB

    • memory/1248-4446-0x0000000005700000-0x0000000005792000-memory.dmp
      Filesize

      584KB

    • memory/1248-4444-0x0000000004F30000-0x0000000004F40000-memory.dmp
      Filesize

      64KB

    • memory/1248-2437-0x0000000004F30000-0x0000000004F40000-memory.dmp
      Filesize

      64KB

    • memory/1248-2435-0x0000000004F30000-0x0000000004F40000-memory.dmp
      Filesize

      64KB

    • memory/1248-2433-0x0000000004F30000-0x0000000004F40000-memory.dmp
      Filesize

      64KB

    • memory/1248-2431-0x00000000008F0000-0x000000000093C000-memory.dmp
      Filesize

      304KB

    • memory/4296-191-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-215-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-181-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-183-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-185-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-187-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-189-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-177-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-195-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-193-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-197-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-199-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-201-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-203-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-205-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-207-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-209-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-211-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-213-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-179-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-217-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-219-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-221-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-223-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-225-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-227-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-2292-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/4296-2293-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/4296-2294-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/4296-161-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/4296-175-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-173-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-171-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-169-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-167-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-165-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-164-0x00000000026B0000-0x0000000002701000-memory.dmp
      Filesize

      324KB

    • memory/4296-163-0x0000000004B70000-0x0000000005114000-memory.dmp
      Filesize

      5.6MB

    • memory/4296-162-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/5068-2311-0x00000000004C0000-0x00000000004CA000-memory.dmp
      Filesize

      40KB