Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2024 10:59

General

  • Target

    7cf0b940c39b45217b214ff26e78587f.exe

  • Size

    23.6MB

  • MD5

    7cf0b940c39b45217b214ff26e78587f

  • SHA1

    cf21bb7712bdae111632c7a13940351b491343a9

  • SHA256

    0532411d15ff23b27d4f5306264a32e972c0181dcb5ca0fe8a9b6694a2280369

  • SHA512

    896224451ad2c44b0429fc6ce5785476ba1b1527beb9a870630f964ca349064232b45e3d648836b791098fd4888b769f6065aefef306451a67bd38a8537279da

  • SSDEEP

    393216:uAP1dyZTDeIRs4dpRhFrjclKdBIYcDJADjOSY1OTlWG80rY3jVMQZTAkWmGN7:b1qDeIRLFrIsNIC3OSVW6c3vTAtv

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 24 IoCs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cf0b940c39b45217b214ff26e78587f.exe
    "C:\Users\Admin\AppData\Local\Temp\7cf0b940c39b45217b214ff26e78587f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\7cf0b940c39b45217b214ff26e78587f.exe
      "C:\Users\Admin\AppData\Local\Temp\7cf0b940c39b45217b214ff26e78587f.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Users\Admin\AppData\Local\Temp\7cf0b940c39b45217b214ff26e78587f.exe
        "C:\Users\Admin\AppData\Local\Temp\7cf0b940c39b45217b214ff26e78587f.exe" C:\Users\Admin\AppData\Local\Temp\7cf0b940c39b45217b214ff26e78587f.exe asadmin
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3152
        • C:\Users\Admin\AppData\Local\Temp\7cf0b940c39b45217b214ff26e78587f.exe
          "C:\Users\Admin\AppData\Local\Temp\7cf0b940c39b45217b214ff26e78587f.exe" C:\Users\Admin\AppData\Local\Temp\7cf0b940c39b45217b214ff26e78587f.exe asadmin
          4⤵
          • Drops startup file
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3052
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bypass.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bypass.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3856
            • C:\Users\Admin\AppData\Local\Temp\Defender.exe
              "C:\Users\Admin\AppData\Local\Temp\Defender.exe" /D
              6⤵
              • Executes dropped EXE
              PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Defender.exe

    Filesize

    802KB

    MD5

    ac34ba84a5054cd701efad5dd14645c9

    SHA1

    dc74a9fd5560b7c7a0fc9d183de9d676e92b9e8b

    SHA256

    c576f7f55c4c0304b290b15e70a638b037df15c69577cd6263329c73416e490e

    SHA512

    df491306a3c8ddb580b7cca1dce9e22a87fd43ca3632f3630cdcbe114bef243e847b2ce774d688f6e142516f2e0fc49d30fad7c7168e627523da21e2fe06836a

  • C:\Users\Admin\AppData\Local\Temp\Defender.exe

    Filesize

    560KB

    MD5

    7ce90f9da5bc322302f0bda92922759f

    SHA1

    5f253c0faeb7b962cf43f11bc8a915210f29db48

    SHA256

    72a0aad63f11eae102079fe8eb07b702c2e407e1746a9fbd200962f63cd37235

    SHA512

    826e785a0a0d53e098f68c736e216ef7e2fa5c9bed51aad6ddb14de6d2261c1bb61b0a8926e1f935aedd010019b7220da808551938bdae82b17c3f8deb0146cc

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\VCRUNTIME140.dll

    Filesize

    74KB

    MD5

    87dd91c56be82866bf96ef1666f30a99

    SHA1

    3b78cb150110166ded8ea51fbde8ea506f72aeaf

    SHA256

    49b0fd1751342c253cac588dda82ec08e4ef43cebc5a9d80deb7928109b90c4f

    SHA512

    58c3ec6761624d14c7c897d8d0842dbeab200d445b4339905dac8a3635d174cdfb7b237d338d2829bc6c602c47503120af5be0c7de6abf2e71c81726285e44d6

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\_bz2.pyd

    Filesize

    78KB

    MD5

    aaf8987c856cf8bef5e4d44f988faf9b

    SHA1

    74c6969fc3260da77f415814da11aa73e145b7b8

    SHA256

    01182e4ad15a5255213dcdd193eba94243732ffdf531a55dfea7e9aab155003f

    SHA512

    730d5b05bc5acd57c2834024e4ca4b71f556f1d711dc840500687b92f302039e9c9108f4ed1752d788c3b1f987aa0f3ec602f1987119439cf150636d0eb3852d

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\_ctypes.pyd

    Filesize

    115KB

    MD5

    01c6a2525adad89427d5b03673f5de18

    SHA1

    6762cfad8dba498526272289322d297b88b8eb03

    SHA256

    bbf6d32fd8159e7c55ab2e49fddd810985268af5f47a3fcf00b11103ab0ce033

    SHA512

    6ad151dc8d154357081254bbd3cad876c0139a6fe3b7c8eb482492f7c9dad20f834a6215b7877c8d62608741f87591f0d776d51a90d588526badf9ba950c28c2

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\_lzma.pyd

    Filesize

    156KB

    MD5

    58e39c90bf8ceeb6744bc6f8c895bafa

    SHA1

    e79f327daa2b02f70517785a8369a2257bc98511

    SHA256

    d7b50ef280e7218bf839f6020ddd353de89f627c4daccccd12290bf1d57ed7e2

    SHA512

    ee5ec80768d6d1c36c2b4b7126addb5174a9733bd32e51e94e6a0e1fc6c852bc262f775e44e91d09897eb62708314d9add6e81685fcbf0f803ebbbb40ccb2322

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\_socket.pyd

    Filesize

    68KB

    MD5

    62cbc5049fb9ae6bc54655daa36896e3

    SHA1

    51e16526c8d03f00ad2d4dc6e5f6aa136ec95061

    SHA256

    2d4926b1f7ce0660bb452528f914abdff9a56429d835ca4437b5e50e24830aa0

    SHA512

    df9d0eb431a32d71437135bd8f95e9f6be0983f4497cead6a39fb265be4f2167a970b7e380569559a09cba426ca09f66351768952b0967799a7e3f7a697a06ae

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\base_library.zip

    Filesize

    506KB

    MD5

    5228f2f54a3a3d673e92dd3f8b6d5244

    SHA1

    c3026b73e398dec67194e3a755aadb4b4fb7dd0d

    SHA256

    77ad3055242d8435e5b032efdae14a0f52286288eff4a36d66bcf36626301ead

    SHA512

    3bc28d37f3a4662a82eddc8ebaa7d03ef18131d5fa30e17b5f54dcc25df9a6e4afff2e40c62740c4202c3957512f36b0ae2346e4cbcd9237ce398910a94ebd8f

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\libffi-7.dll

    Filesize

    28KB

    MD5

    bc20614744ebf4c2b8acd28d1fe54174

    SHA1

    665c0acc404e13a69800fae94efd69a41bdda901

    SHA256

    0c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57

    SHA512

    0c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\python38.dll

    Filesize

    631KB

    MD5

    ab5a067576735d31a244f58b4c8c64fd

    SHA1

    2ce35b10692f2e8c39a6ec83249825447d62a003

    SHA256

    eed8c9c788a52e2698cd2806dfa1fd3c0258d403fd02c53642e423ef982733d2

    SHA512

    246c74938ff560299053dd31fcb310b1f50897c9504b93c3be65ea90a70611b4687a4496b8fc2d88ee8be0bcdbf72ab2a64a7ae969c8d4881624ef542aa3f02e

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\python38.dll

    Filesize

    463KB

    MD5

    2e5643f08d328a7951335becbfbe8ff5

    SHA1

    0896addb495374c2a80e2c264932245f2e11c91c

    SHA256

    14b401c78bdd33cc6d2c9630af5d8dc935d4463cc3b1c260c37dc2819ddfba4d

    SHA512

    16e732b1dbe8ddf749dacc92636cd7d68e210c4707b474e44dbe9bb20b097418278e30f977aa7d1bacbc1e212657704a2e3dc4b6db75a1a1afca19fd5124b67c

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\pythoncom38.dll

    Filesize

    415KB

    MD5

    ba03e764a5cf403c9161a46adf02b86e

    SHA1

    767871753b139c7da22f0d9648e7bdcaaa7efcb6

    SHA256

    7baec45074608ea6d03967f69b5aa1c11125002da82a1211907e04c321b827f4

    SHA512

    72efbf8335cfa4ca561779b49272dda8f9f8793d9a4f2a45b49a7967b56940fb05faac748dd5a90257bc406c36b7cb145145420beb24e296596b4acda5472ce0

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\pywintypes38.dll

    Filesize

    113KB

    MD5

    3206cf4cd05b9e993a822c0dac05b1d0

    SHA1

    f49e809fb19bc1e24f1a7904663375554bd4d5cd

    SHA256

    9a3b70353bb9346bf1ecd2784164feaf6dbc9cb969298091f549ef8269aef930

    SHA512

    a6a4aa66e264e2438df573d31da0827650f48f4877ecabf391d284c99019e041f3333a708e2657ffc565b0cb9933d9c7a77b3726b8f4ec0dda5da3c5e8ab68c0

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\select.pyd

    Filesize

    24KB

    MD5

    b76401951c64387136739bcbb319daad

    SHA1

    9e3aeec14e545e380dbbc8a380890891bcca6b39

    SHA256

    4e4fc6b3db6be0b3d814e2149ff13c91ddbddce1349b73e90743625fa2bc896e

    SHA512

    65c1ccf54ed19aa26649bf593f935bf7a243a057f04fded72d3b6df6498ab4f0ed0a6d9c7c968c14add0c576317526529dcbc6b736b74c330b452248db32c65b

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\win32api.pyd

    Filesize

    102KB

    MD5

    2866bf1a085564a0f63b76173943ba64

    SHA1

    caf810657651b1ec3f667a671e8f9307eeea98b7

    SHA256

    3021294b610e01abd37289ddbe2bf0507e7de3fcb678e07525ec4e0892747955

    SHA512

    d1090831ba6d06c09f1dfe2790b435020854e328f9826937244c13cddb1080cab35f3679ab34eb44d88f9becf4ccf933cd2ebe1b5cc853758bfa9bc04b002068

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\win32com\shell\shell.pyd

    Filesize

    316KB

    MD5

    a315eaae1d3c01ab72c104bab7d13e3f

    SHA1

    302ad3af7e51916dd549398742fc7f19d8c277e6

    SHA256

    ae0b8f1cb78e10cca1d4c862207ee23caffd17dda8e44b4cb10c4ed48a166616

    SHA512

    577f652c88417f61eadfbf77673656894a5a8f00ba07c5e2c51e29b6108315c3c2747fe123148d9d47f890a1b2bfe7188aa9d63b7dc9b6c40761300c3060bbec

  • C:\Users\Admin\AppData\Local\Temp\_MEI22162\win32com\shell\shell.pyd

    Filesize

    392KB

    MD5

    25b02b51bc927b39fb5bb7c7caeba4d9

    SHA1

    bc8728093de7b1bfd9ff67ec27d5038a6ff63cf4

    SHA256

    8d29f88413d6351d9d36e7ce10243164c0c37ff484baa20752de50db39ef1b27

    SHA512

    84753eefc133b85f9c75bb3041cba8f4b35e7689b154ebc8dcca172e1017f3fb2233cd1e24327482d253fdbff3b45bda0ae616af8d2a5b984ad4a9c63cf64942

  • C:\Users\Admin\AppData\Local\Temp\_MEI31522\Bypass.exe

    Filesize

    18KB

    MD5

    3e607070a27a32d5e509c007dd98b20d

    SHA1

    2bc065c4b0fba7eb6ead813095cbf9438540406c

    SHA256

    b1add41be6342ccf155ee169fc89244f6034b91357e927b13404656cb70e63dd

    SHA512

    352b4334ac2933592396298f750023ecfbfdd8bde9ba75f3ffb2be14863e69d2510aa0430adf1a1798befcc5b6341b5262ea70febe0df7a340c6d3473d1d9f0e

  • C:\Users\Admin\AppData\Local\Temp\_MEI31522\Defender.exe

    Filesize

    72KB

    MD5

    2f139507ad3de126d981e17e2b09bc65

    SHA1

    4a190f8a611f2a07f1bbbe4376a6c9f002158549

    SHA256

    f84c2525966285eeab1a5be0c589fad02f0445998ed8314c7094a5e443c5c963

    SHA512

    e183fff3a37ba2662cda30d2a80996dc0fe1196a63a4c091da0d85b1d102daa19f108d0f5f1213d9ce3bf227f3fd820d3c2ad0bbec797e4132059188d5b4d40e

  • C:\Users\Admin\AppData\Local\Temp\_MEI31522\Process.exe

    Filesize

    67KB

    MD5

    4eb00638ea5235307532b6e9eb4b63d2

    SHA1

    69d427e085621d08a937267cee0415ad0a6b0291

    SHA256

    969adab6d034cc50f7b876785f468cab4bf1a400bfaa376d983b3a4ae3f4d535

    SHA512

    ac0692de892048b8c7d797b808774d3c0ca0bcdee061d2f15b58d53f2d81b0b12bc6777a614f23d35b4b30743b933f18cfd4432562936e0fbc9c054d82dde9a5

  • C:\Users\Admin\AppData\Local\Temp\_MEI31522\VCRUNTIME140.dll

    Filesize

    74KB

    MD5

    7acd307424d31067dc7d2a829d4ff620

    SHA1

    815573807054c279e7f6bfc56700515f417bbf16

    SHA256

    87ed80049b914840b3f6cadeedb3b8250898b3c8548024d45f7ea4d72a945d67

    SHA512

    97a9c323578537d38e174d7fa296e87ca9cb0c71cce198806c3a9a6a3d5d845f57c9bd36c4f55072008261a968343b53a18c3109b187a34cf32d6cf61456bcdd

  • C:\Users\Admin\AppData\Local\Temp\_MEI31522\base_library.zip

    Filesize

    760KB

    MD5

    174bb26af0a7c7669d1fb2e54d150971

    SHA1

    ef1ac2b122265f0bca3f776b6ae2a7becc276c35

    SHA256

    02f81520a69cf2a1d901755f61c139f67b6e727ddcd91c46f89b74fb882d6cf6

    SHA512

    ed4f08dbefc4a9b5a4b0051d10fb2efa80add6cf9fab258d8b1f83bcc249a1171146e89716699a3f3ad067a23f04dda28b6f7d9cf1bdcd23b945d97751f8ed19

  • C:\Users\Admin\AppData\Local\Temp\_MEI31522\libffi-7.dll

    Filesize

    25KB

    MD5

    b47380f35b7fcfeda7f3b5bfc26c1b16

    SHA1

    f114b94faf448a66ffff7e54f7329c73c96f9d4e

    SHA256

    9883cd799ff338c97880dbb5ace0a37230ca85c25f1b51d0f8b2189e65546862

    SHA512

    d710ebfa6375b064af4cdbdfeb8b3f769fe45a23bb2b4f8ec6ef232d88bac316bb22cdc34be549a0bc6bdd050b1c8bfdff32222c78f5cc160b0d309d9dde4c76

  • C:\Users\Admin\AppData\Local\Temp\_MEI31522\libffi-7.dll

    Filesize

    6KB

    MD5

    3a3e84a1bc22332d75cd77ef929de3be

    SHA1

    9c7465560986d3110d0aefea76c6cd46d7f02e7a

    SHA256

    584a929894e9fe136586527d9cb1aedfb76ccd27c7fe3eaa84886549bbcc2ed0

    SHA512

    e3c67881c4a00ba43f408ae33053caf65c4f3887b476a7820ecf1e9b2dd6af0ed8ad5e47398916a8c0b61a3207da732be7f60d66eea5b94c00c46390a67554cd

  • C:\Users\Admin\AppData\Local\Temp\_MEI31522\python38.dll

    Filesize

    182KB

    MD5

    9aefdb56fec843c1d15416a5815db0bf

    SHA1

    d42819c141dddf0dff5dff9e924adcced534fc2e

    SHA256

    0e6a0f8969f2b0f4b6dd50ef9acf5c673da6f10e1789bb6e563753e2fddb2189

    SHA512

    eefa4af4410d1ca079d2bf92cbfb8788b5783104cc824679d8eb74adeee3cfa65db83d24f544893726ee8877007580cd4cce03459043aa223fbd6c2c5a8161e2

  • C:\Users\Admin\AppData\Local\Temp\_MEI31522\python38.dll

    Filesize

    104KB

    MD5

    b061393f5c7debabbb07ec6170aae703

    SHA1

    b24022c7f7104d6cfc1c674a307e472d7dfec6d1

    SHA256

    8ef95ad3ae8a2936ca9bafcb59955189946c8d365305099e9a7c4ae25353e9f3

    SHA512

    1aa577329150a0432b0fbd008e5589e4bd52b066ed067d77637b75e3ca269ffcd8f44f5a5b735fad2a08949b1e8b54ea26c64949da202a99e6b666afbc90ffdf

  • C:\Users\Admin\AppData\Local\Temp\_MEI31522\pywintypes38.dll

    Filesize

    12KB

    MD5

    1fc27298639419f333f8c1656a10677b

    SHA1

    5cc7faff1223be79785af5ad0ad0b979161c3759

    SHA256

    1edb17de203c44992e754f5f18bd15ff6503bc553f914b9d66332b5c4281872a

    SHA512

    9c431dc48f8f595b1b04364dbab596e26a4bfc3a03131274f7b995bf30d03f38cffa77dc2e1bf0c7b15ebb3c05dd3c311f9da026b7870320eb3e16411d5981f6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bypass.exe

    Filesize

    621KB

    MD5

    22709abae1f01d878942f391cabedd91

    SHA1

    afbdaed36dbfb2697df1f495fa878f87d5eb886d

    SHA256

    8fcfde3960b39846c6c20f876df883dd18ad68a8e915a9adf52ddc7d0289ffbf

    SHA512

    08accd27d7bdbd742c8d64a53ad40125cb848566bf6dd56e705647c99196861d4c779a040996f74d8b603f46d4a203f05636d34e02942efda5dd2615ebabdcb8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bypass.exe

    Filesize

    582KB

    MD5

    95a61d8ae08cb715a819a0ce533ad024

    SHA1

    6c87f887e129855ecbaa3206621bd66d493daac9

    SHA256

    a7abd26eedc327390cfdac07468cbd09cdde3f078f96fc7fd162c23c19b7cdc7

    SHA512

    ee00e425a90f988cc79ec8d3f9647a79776a4609efc8142c3e241ed7bac9776e55b3694d77a055ee3e5b3a26796dd577cffd90769408a2052bab6e3c588b8475

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bypass.exe

    Filesize

    9KB

    MD5

    548fa20a078056fe7ee1d709cc856bd3

    SHA1

    35915ce92d6da629b9e4487124f86e08db210abb

    SHA256

    6739f108fea870471f242ef2a7f2ad6a17e9f4e281c61ed04006dd1780eface8

    SHA512

    1710aecbc5aa738774300d58d6311c84db3a107283377899bf3c1e1b9fe1b13d915612800d122605c3a5bbf2a7054bcfdefc89b334a1b46863550e4cb704e750

  • memory/3856-146-0x0000000004C00000-0x0000000004C01000-memory.dmp

    Filesize

    4KB

  • memory/3856-147-0x0000000004CD0000-0x0000000004DA0000-memory.dmp

    Filesize

    832KB

  • memory/3856-145-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/3856-160-0x0000000074230000-0x00000000749E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3856-143-0x0000000000390000-0x0000000000432000-memory.dmp

    Filesize

    648KB

  • memory/3856-144-0x0000000074230000-0x00000000749E0000-memory.dmp

    Filesize

    7.7MB