Analysis
-
max time kernel
152s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 14:44
Behavioral task
behavioral1
Sample
dirote.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
dirote.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
f1ght.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
f1ght.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
ger.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
ger.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
kfolder.js
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
kfolder.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
xsiger.bat
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
xsiger.bat
Resource
win10v2004-20231215-en
General
-
Target
dirote.exe
-
Size
553KB
-
MD5
9f23422d7bae3427c8965ac9885f6d68
-
SHA1
aed90ec64afb218feb7f0d5352447d97c2a81eb5
-
SHA256
71db8f9557954bb1f0d5ecc9b1fe7ddd9d23f3e505bcf6a41c86f2b93e4ba787
-
SHA512
14fe187a2d891427301f515add10ae740792b24e2f45960271632650e5cd4b3f258fd3335a78444b4df68e23665866cf536bc361dd6d5690ddca03fd1e19620a
-
SSDEEP
12288:LluLKVDZI1aXnlFpAiITAUXLkE0KK53REtAAzTCcvx5BaL:LzDZwaeiIMuLkZ1Ri/qkn0L
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation dirote.exe -
resource yara_rule behavioral2/memory/3672-0-0x0000000000400000-0x000000000059A000-memory.dmp upx behavioral2/memory/3672-169-0x0000000000400000-0x000000000059A000-memory.dmp upx behavioral2/memory/3672-227-0x0000000000400000-0x000000000059A000-memory.dmp upx behavioral2/memory/3672-229-0x0000000000400000-0x000000000059A000-memory.dmp upx behavioral2/memory/1908-228-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3996-231-0x0000000001000000-0x0000000001031000-memory.dmp upx behavioral2/memory/3996-232-0x0000000001000000-0x0000000001031000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sxpzoolkxd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f1ght.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\dirote.exe" ger.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ = "%1" dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec\ = "%1" dirote.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\DefaultIcon dirote.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.chat\ = "ChatFile" dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application dirote.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\EditFlags = 02000000 dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cha dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.chat dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ = "%1" dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dirote.exe\" -noconnect" dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic\ = "Connect" dirote.exe Key created \REGISTRY\MACHINE\Software\Classes\irc dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\URL Protocol dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cha\ = "ChatFile" dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc dirote.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Application dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ifexec\ = "%1" dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application\ = "c0ldzz" dirote.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\ifexec dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Topic\ = "Connect" dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dirote.exe\" -noconnect" dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\ = "URL:IRC Protocol" dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dirote.exe\"" dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command dirote.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Topic dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dirote.exe\"" dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic dirote.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\command dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Application\ = "c0ldzz" dirote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\ = "Chat File" dirote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec dirote.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3672 dirote.exe 3672 dirote.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3672 wrote to memory of 1908 3672 dirote.exe 94 PID 3672 wrote to memory of 1908 3672 dirote.exe 94 PID 3672 wrote to memory of 1908 3672 dirote.exe 94 PID 1908 wrote to memory of 2012 1908 f1ght.exe 95 PID 1908 wrote to memory of 2012 1908 f1ght.exe 95 PID 1908 wrote to memory of 2012 1908 f1ght.exe 95 PID 2012 wrote to memory of 3996 2012 cmd.exe 97 PID 2012 wrote to memory of 3996 2012 cmd.exe 97 PID 2012 wrote to memory of 3996 2012 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\dirote.exe"C:\Users\Admin\AppData\Local\Temp\dirote.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\f1ght.exe"C:\Users\Admin\AppData\Local\Temp\f1ght.exe" xsiger.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c xsiger.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\ger.exeger ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\sxpzoolkxd=C:\Users\Admin\AppData\Local\Temp\f1ght.exe C:\Users\Admin\AppData\Local\Temp\dirote.exe"4⤵
- Adds Run key to start application
PID:3996
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50d7ee815e4d7dfa077337095f2106750
SHA1c80c8a69860bc31e698ad171c86a4b794284a919
SHA256277510f5e16b944793b10f0d55c903568d10ef8819525a02c0aef31d8c4246b7
SHA5126d1cff56d10029ca46f4ab3a519ea5c7e71e59c032507485db73ae2127cfee1891497564771e09aae0e639c6a0e3171bb61906db53c8cc50605f88c854bd50a7
-
Filesize
2KB
MD5bc7b885f6198f3fca727b01798c4f7a7
SHA1a7bab1cacf4af77915ecadee7fda348898f985d7
SHA25670eebe91ab4d70e0d5517cfc9df5d3f407b863b8cf8e5df83bd62a26ef06b308
SHA5126b26839e788ceda59b1c7e7627c0977a38552d888242aed32aa22889513c5e45b93f6d40843168c74876bbcc8a8b788b73d8d07348a6a170f233771d388ac5bb
-
Filesize
2KB
MD50b1b75cf8e76d2eba6cceda49f2104b5
SHA1f5d461e865fcadbd7996bc752ea24bbefd66550e
SHA256b65ddf1b60c11f798cf58f5da6df7dcb9b1da0fd8b946935c4ee0873224af6ab
SHA51227554eb73cc953006e861b336090ba7700706f42e9c051c9930aaaa1b19166dbcebcc4efcbce43913fc249b44c1d7c4c43b6f5c5d2fb488dddca32459eb40404
-
Filesize
2KB
MD5e34ae6f7ca0cb43d463db278775ba054
SHA18a91aa956244468506a51342716aabe9b386f599
SHA256423240bff18c61cfcc48524f56809b20bf5184d0c872a15230bc2a6141a97961
SHA5125ae1236a01bdeb5348fde31580b5d6fdc0d2bcf6c24f5f53f4622810b25a03a6c39b3bc7a384ae90374189fe94012aec2bff1119b405376969f90fa1e1a2e52f
-
Filesize
176B
MD54dd31177d8a4b8312bd1c2067f73ef5a
SHA1b917837c38cdc2ac2f7982b5d3cbb5d27764798f
SHA256cf93db5f41fc73bf21013fff27eeac189861a471b2b3844afa744c59ae5c96db
SHA512cb4bf024b4527caead8c1da0da7b44b534dfce3a20f30e9c9037bc0d9357bcb852c41b23f11d34a762a00f928e0eae18b0775c8f313128d734f92d7b33c356cb