Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 11:04
Static task
static1
Behavioral task
behavioral1
Sample
1969151091fad0a64c9844ee06be2c7c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1969151091fad0a64c9844ee06be2c7c.exe
Resource
win10v2004-20231215-en
General
-
Target
1969151091fad0a64c9844ee06be2c7c.exe
-
Size
172KB
-
MD5
1969151091fad0a64c9844ee06be2c7c
-
SHA1
16e1845995bc1428914b4ee1661808b151d585f3
-
SHA256
5cbc5c11221458929cf531b4b516560fc2bbc2edab908e69a3e1b46d5d022f0a
-
SHA512
aaf6def8d76895403948f5c8aaa19288732f5c957fc28c3403ab5f127f300e39d788706f8e4d8d4167b303e64ddcfcb676f74330359878c4e996c55bdb66087b
-
SSDEEP
3072:5LpxkNsPZKuPxCNLKFpaVjMqABbOwux+U2yZjQNo7s:5tx8NepawbAxBnpQ+A
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tmteey.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1969151091fad0a64c9844ee06be2c7c.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1969151091fad0a64c9844ee06be2c7c.exe -
Executes dropped EXE 1 IoCs
pid Process 2552 tmteey.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /q" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /k" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /x" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /p" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /n" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /u" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /e" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /h" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /d" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /j" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /v" 1969151091fad0a64c9844ee06be2c7c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /m" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /y" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /f" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /a" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /z" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /g" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /w" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /c" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /b" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /s" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /v" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /i" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /l" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /o" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /r" tmteey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmteey = "C:\\Users\\Admin\\tmteey.exe /t" tmteey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 808 1969151091fad0a64c9844ee06be2c7c.exe 808 1969151091fad0a64c9844ee06be2c7c.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe 2552 tmteey.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 808 1969151091fad0a64c9844ee06be2c7c.exe 2552 tmteey.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 808 wrote to memory of 2552 808 1969151091fad0a64c9844ee06be2c7c.exe 89 PID 808 wrote to memory of 2552 808 1969151091fad0a64c9844ee06be2c7c.exe 89 PID 808 wrote to memory of 2552 808 1969151091fad0a64c9844ee06be2c7c.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1969151091fad0a64c9844ee06be2c7c.exe"C:\Users\Admin\AppData\Local\Temp\1969151091fad0a64c9844ee06be2c7c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\tmteey.exe"C:\Users\Admin\tmteey.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5a7dc246742dfd9c362a1f4bfface5a9d
SHA1ed37f8520930eb204131805c416b76ea3245653c
SHA2568fea05faacf42353f0ffd6cd9cac97e85e5bf8106da0289dc974d1090e0d0510
SHA512179b8ea4392e45bdac99da2fe87de9c0314eeacf1005a5a934b4b0ac6428503e2d7f2b99c9b8e055bcf4e46dd81efda34b2f5fc0ab39ffb9f4a2a15b4313b270