Analysis

  • max time kernel
    139s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 16:42

General

  • Target

    2e03274042622c7564d404ef935cb9af.exe

  • Size

    80KB

  • MD5

    2e03274042622c7564d404ef935cb9af

  • SHA1

    1705a666d1391958c1b99c3b5d9b8b49ec146713

  • SHA256

    6c9b902b350f49296325ad3b63d2c9e72b8ae7549c4b2fbf1383c34e24014d69

  • SHA512

    d89cc35c6e5413c8c6c0d08502666407651e1442680a4d52587e0580818d92e446d79685927816a81c9152975ac1c9146c000366c5788d6f3a4fb4cf5bbadfcb

  • SSDEEP

    1536:p5neEhlcTW5sk17tf2XvWINndIcN6Jg/ltEEWGklmKcXXF1ZIHgKwp:jnj97tfU+INndIc0JgtKbtmvFMmp

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e03274042622c7564d404ef935cb9af.exe
    "C:\Users\Admin\AppData\Local\Temp\2e03274042622c7564d404ef935cb9af.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\start.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\start.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RichVideoInstall.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RichVideoInstall.exe
      2⤵
      • Executes dropped EXE
      PID:2536
  • C:\Windows\SysWOW64\reg.exe
    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "mW[íµˆÖ¾`=µú¾˜v%S8’ÿÙêé>grl>­Ý\†Ð=ŸàÛ±Þ
    1⤵
    • Modifies firewall policy service
    • Modifies registry key
    PID:2828
  • C:\Windows\SysWOW64\reg.exe
    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\start.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\start.exe:*:Enabled:Windows Application Service" /f
    1⤵
    • Modifies firewall policy service
    • Modifies registry key
    PID:4876
  • C:\Windows\SysWOW64\cmd.exe
    cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\start.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\start.exe:*:Enabled:Windows Application Service" /f
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4608
  • C:\Windows\SysWOW64\cmd.exe
    cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "mW[íµˆÖ¾`=µú¾˜v%S8’ ÿÙêé>grl>­Ý\†Ð=ŸàÛ±Þ
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RichVideoInstall.exe

    Filesize

    53KB

    MD5

    023ea60c497954b1cb7e31db70855d6a

    SHA1

    ac88bf9a82abad1e4a3193066584fde82cdddd83

    SHA256

    cb70baf4499ac1d1f9852d4fc1bf8ab96f0f4d283168ad50e39121d3edc3d116

    SHA512

    909ba7284f305549729bfb26aa24efdb7d7764d8e2a42ab1a78deaaff0dd63dbe348d616cbc904a970854b281231919973f70b98be903aefafc10281ca7fa613