Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 11:04

General

  • Target

    1969151091fad0a64c9844ee06be2c7c.exe

  • Size

    172KB

  • MD5

    1969151091fad0a64c9844ee06be2c7c

  • SHA1

    16e1845995bc1428914b4ee1661808b151d585f3

  • SHA256

    5cbc5c11221458929cf531b4b516560fc2bbc2edab908e69a3e1b46d5d022f0a

  • SHA512

    aaf6def8d76895403948f5c8aaa19288732f5c957fc28c3403ab5f127f300e39d788706f8e4d8d4167b303e64ddcfcb676f74330359878c4e996c55bdb66087b

  • SSDEEP

    3072:5LpxkNsPZKuPxCNLKFpaVjMqABbOwux+U2yZjQNo7s:5tx8NepawbAxBnpQ+A

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1969151091fad0a64c9844ee06be2c7c.exe
    "C:\Users\Admin\AppData\Local\Temp\1969151091fad0a64c9844ee06be2c7c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Users\Admin\tmteey.exe
      "C:\Users\Admin\tmteey.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tmteey.exe

    Filesize

    172KB

    MD5

    a7dc246742dfd9c362a1f4bfface5a9d

    SHA1

    ed37f8520930eb204131805c416b76ea3245653c

    SHA256

    8fea05faacf42353f0ffd6cd9cac97e85e5bf8106da0289dc974d1090e0d0510

    SHA512

    179b8ea4392e45bdac99da2fe87de9c0314eeacf1005a5a934b4b0ac6428503e2d7f2b99c9b8e055bcf4e46dd81efda34b2f5fc0ab39ffb9f4a2a15b4313b270