Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 14:29

General

  • Target

    75a850e148c8d976cdb86366dafd55e1.exe

  • Size

    232KB

  • MD5

    75a850e148c8d976cdb86366dafd55e1

  • SHA1

    3d403e4ce1828180040d1ff83ff3b4d993498a83

  • SHA256

    38f130d0b28383af6a3f1ee3b4d61d9ebd23613e851c5462d497aa15ed24a9d4

  • SHA512

    a6ccb0884165ea7104d57cc6d094f50a7f5926b8dc68fb0567b68a40cb6b5f49b4a78bf75752fc7018a90c23e83125e5bcfb62a04e9bc5eb43762a81861e8538

  • SSDEEP

    6144:Ny1q3PFKs78vpRTlEqxF6snji81RUinKbLv:zPhp

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75a850e148c8d976cdb86366dafd55e1.exe
    "C:\Users\Admin\AppData\Local\Temp\75a850e148c8d976cdb86366dafd55e1.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Users\Admin\tuenae.exe
      "C:\Users\Admin\tuenae.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tuenae.exe

    Filesize

    232KB

    MD5

    437c266f61dc07d04c739248692b7081

    SHA1

    932e51d4e729e5020299014d68ae026ac3618a9f

    SHA256

    8549e801c97b3f7b8ed1aaae54c093bb1bd9043ae502aa7d62b038e6ba57d325

    SHA512

    e5c691f0be53534d34ae0a1bb40cca675b39498400a044cd91d198bd0f498dc0f1c4aa8f7da191e36366111911cd70dae7d7cbae4443f6f2f33a1982bb55ee7e