Analysis

  • max time kernel
    166s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 00:41

General

  • Target

    1da21a92459776d2f458a61fcc16ff50.exe

  • Size

    240KB

  • MD5

    1da21a92459776d2f458a61fcc16ff50

  • SHA1

    a9a5fb5d4598b0c1892931113180d7c5fba88d62

  • SHA256

    10ba82ac92b74ab25d22a8033feae92f027b652f39a4e93e401525cfb66eb61f

  • SHA512

    be3b028cdf5306a3ee183d33e378e36fe0d58935734ff5c201b2ca11a65ee2c7aca98469bb8975b8a4967eb367b8647afd10b76d929319fcc866eca63a642471

  • SSDEEP

    6144:ko65UtO7RQjX7XN1kd9JbSDviiopNDa/N08i1/W:J4xNTW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1da21a92459776d2f458a61fcc16ff50.exe
    "C:\Users\Admin\AppData\Local\Temp\1da21a92459776d2f458a61fcc16ff50.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Users\Admin\wioxi.exe
      "C:\Users\Admin\wioxi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2496

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\wioxi.exe

          Filesize

          240KB

          MD5

          6a43d0f2de8012cb8cb1b1929dfb2925

          SHA1

          3250fc9c9d0d1e8f12a2007dee679a1840f4a168

          SHA256

          4a929b4972707335a402d611ceeba025d9505acbd2b4e1505337745fdf37092a

          SHA512

          2cfa9ac92efae0d2e035cff1bdef69eba868bf49e91c4645f183618d505e089034f18b74b9b1b985e6e1a53af0069ee5ddc28c1d98feef9698c82177b7b3083a