Analysis

  • max time kernel
    179s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 03:58

General

  • Target

    043d8def8d9c9d603b5a6320b4e8a9e6.exe

  • Size

    292KB

  • MD5

    043d8def8d9c9d603b5a6320b4e8a9e6

  • SHA1

    69c0b167a82e148f27ec35208230232204581d32

  • SHA256

    19cac766fac463a947302ab28b35cbd479b4d293340833b23fce34faf048b45d

  • SHA512

    654e9e2c442d058b0716388c6426079d1790824239abb125a1c806717a39b2007ed999906d19daacc785943e2eda5bbc71bb5355c6747ffe29bb17b69cf3f252

  • SSDEEP

    6144:m6f0iLlxjqNeVilscsU3ESMCjtpUABR6YLzSv79VxUutl:fXLlx2kViuUPMCjtpUABR6YLzo7RUy

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\043d8def8d9c9d603b5a6320b4e8a9e6.exe
    "C:\Users\Admin\AppData\Local\Temp\043d8def8d9c9d603b5a6320b4e8a9e6.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3460
    • C:\Users\Admin\zeiup.exe
      "C:\Users\Admin\zeiup.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\zeiup.exe

          Filesize

          93KB

          MD5

          877d22970904b5928352c41485abbd70

          SHA1

          1e2262448a50aab274f6246673cdec8c7ffad53f

          SHA256

          233428e1ae02d29c1386ea539cdb775da4e61c98cfc1366976c5d9342bdd9350

          SHA512

          1c491bfd02a7f1c58acb7c5b2d9fa773af5d9db652106131698e5a3d5b543c8c5363ad6ef1b24df540fbdbc50cf5e9ebdb55150ead1961cd0892e11ec2fce7f4

        • C:\Users\Admin\zeiup.exe

          Filesize

          292KB

          MD5

          19537855d62d2c3e735ae4839d0ea736

          SHA1

          a570b5757d5f3ac75e5479c4013cccb37587bcfe

          SHA256

          ee3470120de2c663717f13107e3e315df37d2f3a9c6590b1958c11a1e740ae94

          SHA512

          2a7cc5f260567112597c09dafb5b13af321719cf30cae1e4bdf22f68071ae75c59e425e4b7f65f4d4095243dcc62be849dc9698765ef0bbd9d8b573b294e985d

        • C:\Users\Admin\zeiup.exe

          Filesize

          99KB

          MD5

          b1ef17d88fe64a7b9c9237bd9eece5e9

          SHA1

          78e76003ddcb88d86e16ca8c14188fd735470bb9

          SHA256

          176fd0dad43ad91edbf8356127b87ca7ec22ec7d243d476d365317611a096401

          SHA512

          5cb724c3effb380a163aa1134811d08d14a1bdd99f8359348b7a5bf02b679051f12f276dba223c2c4bed9b893281a00150ebdf50c6b878ecc913fb6acda72933