Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 21:56

General

  • Target

    04f4a1d86b2de3abeef0a6ad17553d0a.exe

  • Size

    96KB

  • MD5

    04f4a1d86b2de3abeef0a6ad17553d0a

  • SHA1

    7576ef887427b4a223446fbb9fc556e90515163a

  • SHA256

    381b8e1e90e20d658ae7acea40bbcbe8dd1f93007b245a7127d72bd5ab5d52b7

  • SHA512

    cca4f09a7eff5ce689f3c60544002e4c107ea8b19455850cedcbfae9430988820185db99d012c59f9da868082c95d8d8a6b06949d4015151981122fea2675492

  • SSDEEP

    1536:4ceSb9Tj8Q89H1UbLSLeocTzFJ0T72VpIc:1tj4eBTzFJ0T728c

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04f4a1d86b2de3abeef0a6ad17553d0a.exe
    "C:\Users\Admin\AppData\Local\Temp\04f4a1d86b2de3abeef0a6ad17553d0a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Users\Admin\woaqo.exe
      "C:\Users\Admin\woaqo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\woaqo.exe

    Filesize

    96KB

    MD5

    aa2f5425bfb3e1d83fb414962cc4c97a

    SHA1

    723677683869c70f987632afa2a4eada6868fd8d

    SHA256

    a1a27dae17b73616e35f785a6d25317e4bb25a5359950f2d0e8d11594e38405f

    SHA512

    95220c7ec7a049c3d44539e199d227e15d7a9f9f7717693cccc9f3a356857d241eaa6da5746a15954f9cc96dfe541a94488e9eef15836cec29c3dce4ae955888

  • C:\Users\Admin\woaqo.exe

    Filesize

    1KB

    MD5

    2e2e95e13e3b793bfa79edf436c6bc90

    SHA1

    c5a0f89bd546483d0351c187acbc3e55df246a24

    SHA256

    066f999eb355444201cea9cabd010753431e0d92b7821cf7eaf5b2277b12e3ff

    SHA512

    2474f228c85b761cff2379fa0de35fe79e0d00f2037dd8755285b4200fced76ccc0efc6ed892cb6304f31f6e4a3019baa34a9455d8347c1a394ec69d0b3a73d6