Analysis

  • max time kernel
    123s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 02:03

General

  • Target

    4b539b0ea7ba4b59529d41275e8a97ee.exe

  • Size

    96KB

  • MD5

    4b539b0ea7ba4b59529d41275e8a97ee

  • SHA1

    975e1f67cefa0f0014b61392269a7b285abc835f

  • SHA256

    43c9ee0e24b1f13015a3a6a4deb843d03d45b47d1ffdb7dc864f5d2188200f03

  • SHA512

    5c192f1f81663320dfea5831cf438db3e69489068df3bbf3abaf9703ad985283eb69e1ebb4dc711f8b88dd3ac69f00fc6de84217d263a673276dea91fecd778f

  • SSDEEP

    1536:2QPH+8MK1dGW3KuXDNSj6Jcv8gjhfFj2PzR/jG3qDP:NvqK3GUKAJgjw/nD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b539b0ea7ba4b59529d41275e8a97ee.exe
    "C:\Users\Admin\AppData\Local\Temp\4b539b0ea7ba4b59529d41275e8a97ee.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Users\Admin\fiefoi.exe
      "C:\Users\Admin\fiefoi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fiefoi.exe

    Filesize

    96KB

    MD5

    19a3737fa9f1048da7c831c3831380f3

    SHA1

    ee1c0bd4e79a34efb9c65a411500c729816e3ff1

    SHA256

    4fc139a0966a7a74c48cb4497f872ab699f8c3f65bb15c729a7625e64f47c23a

    SHA512

    2d2c96b9a77e6ef16a5c5e2fffd6730ceee8437f1b1370404a4f9caedcaba92508fed98baa4c0283d5002c8fa6d3f51519e5a74f5d749e183bdc951f67f6342a