Analysis

  • max time kernel
    191s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 13:53

General

  • Target

    235943f6dc8176e0b346957c469e6ad8.exe

  • Size

    192KB

  • MD5

    235943f6dc8176e0b346957c469e6ad8

  • SHA1

    8641f8177b08a3fd01f11b3257510db9a56f47ce

  • SHA256

    45d775a0c1f596729b329677b148047553b6b3d52b0d108331b4243cdb77a1e3

  • SHA512

    b4ccc27ac07a04f171ecdbb7b69eca852412d2686fcb3764bc0a6a3f488ab22b27febb82e23c86eab1c9c434cf9ae0a9d73ef00f8f8454ada075f22177bf906d

  • SSDEEP

    3072:POm0VJVOSokrwInQrLS4kZxPQtmnU9Ri7TJAc1BkHy8IA9aVsVHZ:mm0VJVOvI6S4QQtOU9ROp8/V5

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\235943f6dc8176e0b346957c469e6ad8.exe
    "C:\Users\Admin\AppData\Local\Temp\235943f6dc8176e0b346957c469e6ad8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\dienuo.exe
      "C:\Users\Admin\dienuo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1064

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\dienuo.exe

          Filesize

          192KB

          MD5

          8bf31fe1de9f1fb3d7448ef6cfeb5864

          SHA1

          56492d51b2517ff38b8d6624993d7b6f0322f53e

          SHA256

          732ea51a0cb91314fca9dc6199ef167aa30e1917abc6bfb4751de630074f01af

          SHA512

          80d9a08bf27f1bce8c48ff2d08b6275a9ba372f2e631cca13b2f1d2c4ddae5375fedd8df914a051545f4841d3a36e7309bb03e2da5bd9c9ec5a6a30041bbc769