Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 16:46

General

  • Target

    2e4838193f9ea687b28c964e40d8c1e9.exe

  • Size

    204KB

  • MD5

    2e4838193f9ea687b28c964e40d8c1e9

  • SHA1

    ecd858ce508b20da22f448d9335c3698a7c8614b

  • SHA256

    b07ba6a8c0f54ad6dbfd01e89a2ab3275c2b325d7dd7c1b33bc19b5378914c50

  • SHA512

    9a9ca69514da1528a4d46443b5b897fe08d56564ceed0a15996696caa02f4186d686adf50e77b5c4194cdf71df1d1d89e8cf316dbc828fdf88997ec4bc183a29

  • SSDEEP

    3072:FVepCcNp9fvyU+mzihKh8wpzDqulR3X9sDpLg6ZGKIXeYnwlD:FVeVAEV82llbs1g6+Xbw

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e4838193f9ea687b28c964e40d8c1e9.exe
    "C:\Users\Admin\AppData\Local\Temp\2e4838193f9ea687b28c964e40d8c1e9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\heiril.exe
      "C:\Users\Admin\heiril.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\heiril.exe

    Filesize

    204KB

    MD5

    cedb350d4913d12322cc268ff7b799e1

    SHA1

    838145b881f3415632a961167c5ec68d03df9c8d

    SHA256

    1f8dbcc5b96816f073824bd45e13a9a34fdb4cde0582f5980ab73e15efb48d66

    SHA512

    b00783abf5a8a90cf25a404ab4b434b74abce306b20dbf0bf2e2f609de29acf18b368b2438005316d8138ef2c2a37abfec33e0ccdd728ff014c14fff0086fd1f