Analysis

  • max time kernel
    186s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 23:50

General

  • Target

    078fc59aea233c9c2bf09460a63a395b.exe

  • Size

    124KB

  • MD5

    078fc59aea233c9c2bf09460a63a395b

  • SHA1

    a3b070891de772c34c05c2e74e1a00b535b5e024

  • SHA256

    ecde594db524e9418daaae9918ce31eaa57b9690b181210560ef91e4468561c6

  • SHA512

    e4a19e97b1d08b1006031970bc334e96439f54b30d089b2c7baff6111b8640559df801e3288bb37a57931272cd4111c8a84f4fc5fed1eef04f47cd47a0231dcd

  • SSDEEP

    1536:UubUEFbQnQ/67NxkiQixA+alh98r8Y9USv1jyPwo7JaS1:TbUEFsnQ/67gjH8ri8iwQL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\078fc59aea233c9c2bf09460a63a395b.exe
    "C:\Users\Admin\AppData\Local\Temp\078fc59aea233c9c2bf09460a63a395b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\guekio.exe
      "C:\Users\Admin\guekio.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\guekio.exe

    Filesize

    124KB

    MD5

    c90044a7c03c12837fa674a4b7e77cf6

    SHA1

    71e97c4a03d0c7bda103edbe662b2500d161c8a5

    SHA256

    4adba95e3b167107334480231f216e5c370fcc5ef7e6956b3e24b8cc7193fd76

    SHA512

    0c26fdcdf77caad3eccb8cbdcd2fee3e5e9f09e02c8d3e258a5993f713f1546df9b3cf559cb64323dc87d5848080f73c9e6672922d911336961f38628ee47e27