Analysis

  • max time kernel
    176s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 10:56

General

  • Target

    69053461019e8348eae05f1581afe62b.exe

  • Size

    384KB

  • MD5

    69053461019e8348eae05f1581afe62b

  • SHA1

    6b1bde693d5d46fc9c3170e4a0698565a98bd59d

  • SHA256

    32f1af0144851b9f2775ae807adba2fb0a92ef02f3c3797beba389ca64149b39

  • SHA512

    56815e627720bb5873a55513e65111a7f0445e1f4b102ed6b34a93d1c46092117a93690df45e3bc4e8077742d1438e639dfbd1a65eb10c6c0db9b9b30b52c591

  • SSDEEP

    6144:KBbgxaXTusPZ+BTul3eq2dNZwsqV6tnwczPDzO0G+j:YbPusR+BTul3eq2dNZcew2PG0G+j

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69053461019e8348eae05f1581afe62b.exe
    "C:\Users\Admin\AppData\Local\Temp\69053461019e8348eae05f1581afe62b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Users\Admin\meilii.exe
      "C:\Users\Admin\meilii.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\meilii.exe

    Filesize

    384KB

    MD5

    1bd6e70f2c96d8cf154b371df28bfcc9

    SHA1

    e87d8f2541c26935310f32343ddc592fc9f0d6da

    SHA256

    3581dcc5b946517afada56d8a021784d391ce65d59f9f5ee9f742505102829a9

    SHA512

    5b27a82b771aabfffd356c0cade916cf3126ba611a90c62529193fd7ebc14c2f5d3c535618805751f600365ca24347cfd971e4ecff2006e2a19fc4621e433196