Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
0155e35d6bf8759c362f66abab374022.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0155e35d6bf8759c362f66abab374022.exe
Resource
win10v2004-20231222-en
General
-
Target
0155e35d6bf8759c362f66abab374022.exe
-
Size
68KB
-
MD5
0155e35d6bf8759c362f66abab374022
-
SHA1
89e4460560ea164e62a6432fd8100c34406ac237
-
SHA256
b54451a17490f0837b2a77491fb0e7c38e8ec2389fc3de700f218d941d255882
-
SHA512
363651c7303013f1e6432cfb6f91f9857c4b2f81e79479127ce16143a869ef05bf7c963031c74165c1778fffc90b6672e6eb0f3b294dc23ec0084f15935c0168
-
SSDEEP
768:FcVliTdyOAl+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:iVIx1AcqOK3qowgnt1d
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0155e35d6bf8759c362f66abab374022.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 0155e35d6bf8759c362f66abab374022.exe -
Executes dropped EXE 1 IoCs
pid Process 4272 Admin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 0155e35d6bf8759c362f66abab374022.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 4272 Admin.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2904 0155e35d6bf8759c362f66abab374022.exe 4272 Admin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2904 wrote to memory of 4272 2904 0155e35d6bf8759c362f66abab374022.exe 91 PID 2904 wrote to memory of 4272 2904 0155e35d6bf8759c362f66abab374022.exe 91 PID 2904 wrote to memory of 4272 2904 0155e35d6bf8759c362f66abab374022.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0155e35d6bf8759c362f66abab374022.exe"C:\Users\Admin\AppData\Local\Temp\0155e35d6bf8759c362f66abab374022.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD54654ca511e7ec3d83f6242bad0067de9
SHA196de9cea471a0ca2be466e7cda2d6f59a5e1dbc5
SHA256eca2c9c9b977413a77c01054bd57169c6ba53585ba0069a045f244cba03595cd
SHA512a761bac21365aea5020658c82082c825d3b599e2dab4517eb8c25584340b1444dca44bd1f622b604843f9aae1fcdff7bae0c2d6c468231b05b8da64a87804f7e