Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
2d084288c8d56c08f30df91466d9e1d5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d084288c8d56c08f30df91466d9e1d5.exe
Resource
win10v2004-20231222-en
General
-
Target
2d084288c8d56c08f30df91466d9e1d5.exe
-
Size
132KB
-
MD5
2d084288c8d56c08f30df91466d9e1d5
-
SHA1
266a61101b7e6656f5d18863cba47df365499c5a
-
SHA256
02f11bcc9dbeeec736e1bb037b3bc0d5145074a4bf9d5ef8644ddf32e0c959e3
-
SHA512
fb9c496e9f2575f5d8ab397f9bf161c66db436123a52dbba5cc3f7b2338047808e41ff4a36c8cf3776540df820b327ed69ce533bdddf3759127e8b75373d7cec
-
SSDEEP
1536:N1ds3uh/YVgIIKZrDJZ3JuIuRWIelOQ212I/6jDSUaWpEEHCjP4YTyPhQHyC:F59Yh8IuRrjWmEiyPhM
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2d084288c8d56c08f30df91466d9e1d5.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" heooba.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2d084288c8d56c08f30df91466d9e1d5.exe -
Executes dropped EXE 1 IoCs
pid Process 1580 heooba.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /j" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /r" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /e" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /s" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /m" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /a" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /h" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /q" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /g" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /v" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /n" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /c" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /w" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /o" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /u" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /p" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /y" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /k" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /x" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /t" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /i" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /l" 2d084288c8d56c08f30df91466d9e1d5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /f" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /d" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /z" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /b" heooba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heooba = "C:\\Users\\Admin\\heooba.exe /l" heooba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4008 2d084288c8d56c08f30df91466d9e1d5.exe 4008 2d084288c8d56c08f30df91466d9e1d5.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe 1580 heooba.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4008 2d084288c8d56c08f30df91466d9e1d5.exe 1580 heooba.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4008 wrote to memory of 1580 4008 2d084288c8d56c08f30df91466d9e1d5.exe 91 PID 4008 wrote to memory of 1580 4008 2d084288c8d56c08f30df91466d9e1d5.exe 91 PID 4008 wrote to memory of 1580 4008 2d084288c8d56c08f30df91466d9e1d5.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d084288c8d56c08f30df91466d9e1d5.exe"C:\Users\Admin\AppData\Local\Temp\2d084288c8d56c08f30df91466d9e1d5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\heooba.exe"C:\Users\Admin\heooba.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD541a11884d4cf8bff416d785330ff578b
SHA195e25a416e30c2c4408889925ee31937c8ce7ed6
SHA25640a0a66bae58a7e41ba44337f9d692dad74d9ea218efe7c4836aaa26477fb3fb
SHA512d07e71c1ad3565a3dcec14a7952f19a52a72f2b380a1634349fe8b0ead091709b030cf40f4d07a2415efcbb23756b9774fc8c716474eb89d8cc54a3c118481b0