Analysis

  • max time kernel
    103s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 05:53

General

  • Target

    049df77c663026a03fc509928ee04060_JC.exe

  • Size

    56KB

  • MD5

    049df77c663026a03fc509928ee04060

  • SHA1

    3cdff8bc3026eef12699b051d4b4d5141e3702a7

  • SHA256

    8aac7de89ac02e02400ad54be2e6ce46679a6f4d38014bc01fbd61229444a250

  • SHA512

    69a4592d3629d38c4c4c1620102377030760d04037cfc1e5e2a02fc50645bc8a0e3dbca4c017a009f5938be3d867e3fac7470e9027bd025e44b83cb4c7c33bb0

  • SSDEEP

    768:x6YNEhmy1g9f3v+6wH9H7MfygXaDMFQXD7eOwih:x6YamyWf76NNDsQXD7OY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\049df77c663026a03fc509928ee04060_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\049df77c663026a03fc509928ee04060_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\riuom.exe
      "C:\Users\Admin\riuom.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\riuom.exe

    Filesize

    56KB

    MD5

    06e7bd2af9cf9c3545e2a6470cb00b5e

    SHA1

    355c6b6bdc03900840d458235ff7bf0e3bc2865d

    SHA256

    03b31d19ec1aa6909c37dff47cd32e678230c147bf858bca82c0a96506c88d85

    SHA512

    8754d893712a9efaad41704dd61c3c9507bb6c433ab07f18c66bcd70f1c8e0610bb3ce2b04f5dd75f4f0c12c25c2f4c6ea9a155093ac1504fe61fe1d68f71bb2

  • C:\Users\Admin\riuom.exe

    Filesize

    56KB

    MD5

    06e7bd2af9cf9c3545e2a6470cb00b5e

    SHA1

    355c6b6bdc03900840d458235ff7bf0e3bc2865d

    SHA256

    03b31d19ec1aa6909c37dff47cd32e678230c147bf858bca82c0a96506c88d85

    SHA512

    8754d893712a9efaad41704dd61c3c9507bb6c433ab07f18c66bcd70f1c8e0610bb3ce2b04f5dd75f4f0c12c25c2f4c6ea9a155093ac1504fe61fe1d68f71bb2

  • C:\Users\Admin\riuom.exe

    Filesize

    56KB

    MD5

    06e7bd2af9cf9c3545e2a6470cb00b5e

    SHA1

    355c6b6bdc03900840d458235ff7bf0e3bc2865d

    SHA256

    03b31d19ec1aa6909c37dff47cd32e678230c147bf858bca82c0a96506c88d85

    SHA512

    8754d893712a9efaad41704dd61c3c9507bb6c433ab07f18c66bcd70f1c8e0610bb3ce2b04f5dd75f4f0c12c25c2f4c6ea9a155093ac1504fe61fe1d68f71bb2

  • memory/756-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/756-25-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/828-21-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/828-26-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB