Overview
overview
8Static
static
3admin/2007...ir.exe
windows7-x64
3admin/2007...ir.exe
windows10-2004-x64
7admin/2013...ir.exe
windows7-x64
4admin/2013...ir.exe
windows10-2004-x64
7admin/Book.xltx
windows7-x64
1admin/Book.xltx
windows10-2004-x64
1admin/Coremail.exe
windows7-x64
3admin/Coremail.exe
windows10-2004-x64
7admin/Desk...nk.exe
windows7-x64
8admin/Desk...nk.exe
windows10-2004-x64
8admin/Desk...on.exe
windows7-x64
7admin/Desk...on.exe
windows10-2004-x64
7admin/EXCEL12.xlsx
windows7-x64
1admin/EXCEL12.xlsx
windows10-2004-x64
1admin/Emai...ir.exe
windows7-x64
3admin/Emai...ir.exe
windows10-2004-x64
7admin/Exce...ir.exe
windows7-x64
3admin/Exce...ir.exe
windows10-2004-x64
7admin/Exte...ir.exe
windows7-x64
3admin/Exte...ir.exe
windows10-2004-x64
7admin/Font...ir.exe
windows7-x64
3admin/Font...ir.exe
windows10-2004-x64
7admin/Goertek.xltx
windows7-x64
1admin/Goertek.xltx
windows10-2004-x64
1admin/Hide...ve.exe
windows7-x64
3admin/Hide...ve.exe
windows10-2004-x64
7admin/Normal.dotm
windows7-x64
4admin/Normal.dotm
windows10-2004-x64
1admin/Offi...on.exe
windows7-x64
3admin/Offi...on.exe
windows10-2004-x64
7admin/Outl...on.exe
windows7-x64
1admin/Outl...on.exe
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 05:13
Behavioral task
behavioral1
Sample
admin/2007 Office Template Repair.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
admin/2007 Office Template Repair.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
admin/2013 Office Template Repair.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
admin/2013 Office Template Repair.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
admin/Book.xltx
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
admin/Book.xltx
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
admin/Coremail.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
admin/Coremail.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
admin/Desktop shortcut blank.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
admin/Desktop shortcut blank.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
admin/Desktop shortcut deletion.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
admin/Desktop shortcut deletion.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
admin/EXCEL12.xlsx
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
admin/EXCEL12.xlsx
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
admin/Email Outgoing Plugin Repair.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
admin/Email Outgoing Plugin Repair.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
admin/Excel Security Level Plugin Repair.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
admin/Excel Security Level Plugin Repair.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
admin/External plugin repair.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
admin/External plugin repair.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
admin/Font Scramble Repair.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
admin/Font Scramble Repair.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
admin/Goertek.xltx
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
admin/Goertek.xltx
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
admin/Hide w drive.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
admin/Hide w drive.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
admin/Normal.dotm
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
admin/Normal.dotm
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
admin/Office2013 activation.exe
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
admin/Office2013 activation.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
admin/Outlook authentication.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
admin/Outlook authentication.exe
Resource
win10v2004-20230915-en
General
-
Target
admin/Hide w drive.exe
-
Size
87KB
-
MD5
fa331d2f451c217fd8ff0c929f58b0db
-
SHA1
46b232edf18e880cb067531372626c0e1f696c38
-
SHA256
af1f50e992e0e68f30fd152bbd508db1afb09aac1d21f867daebba22f9c3c368
-
SHA512
93dbf115b935fdc81b5e40e46daca06b3998552437571c52fffa2bdc0bb99a5508d8f29522713d87850a8c186fe441df63422458b7d38225157a497c1963faab
-
SSDEEP
1536:r7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfyxe:nq6+ouCpk2mpcWJ0r+QNTBfyI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation Hide w drive.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 4108 regedit.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3856 wrote to memory of 5040 3856 Hide w drive.exe 85 PID 3856 wrote to memory of 5040 3856 Hide w drive.exe 85 PID 5040 wrote to memory of 4108 5040 cmd.exe 88 PID 5040 wrote to memory of 4108 5040 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\admin\Hide w drive.exe"C:\Users\Admin\AppData\Local\Temp\admin\Hide w drive.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CC87.tmp\CC88.tmp\CC89.bat "C:\Users\Admin\AppData\Local\Temp\admin\Hide w drive.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\regedit.exeREGEDIT /S "C:\Users\Admin\AppData\Local\Temp\~import.reg"3⤵
- Runs .reg file with regedit
PID:4108
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552B
MD59d35bda9ae85b20e89bf9eca5b5804cc
SHA17121e43043450a604a01d7bdcc54479ca12ee0c2
SHA256dc23359e79a19683956763473a8deec99009fb1ba4b526bee954f4a3a4439c3d
SHA5126d80ef3dfaceaaa6459ac2812f278befdf870137c62afa9c8344f159b751fd9689ed4eb453254430d57f78ab1baf741e47d36309da5ec28ea753a98513f311e8
-
Filesize
149B
MD56bcca5c1527b2ee197362076809f0ce7
SHA111eb2afb29c604dd6febc0f2ef21795dde0969b0
SHA256addd4a35685b2df1aa9939ae0ae1df228ebd3da96588ebe793ba1ffb73b5cc77
SHA512e1c06887ad09e0dac6656b7cd64179f28f0963fb9cddb5ed2b83ad188a830c4fc12b6672c7cccef6cde839851225d00aed582197da10abfd7ff10506abcdbad1