Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:08
Static task
static1
Behavioral task
behavioral1
Sample
11c43fe140d60ebeecfe7ee3b1120cd8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11c43fe140d60ebeecfe7ee3b1120cd8.exe
Resource
win10v2004-20231215-en
General
-
Target
11c43fe140d60ebeecfe7ee3b1120cd8.exe
-
Size
240KB
-
MD5
11c43fe140d60ebeecfe7ee3b1120cd8
-
SHA1
4146c683b713e9a8eac35313795576cb69f64595
-
SHA256
30be123f0daec1f03ca8648594952c0a008e1358b224bea7be7130da3306d3c3
-
SHA512
c6c5e70462184705d0e098105f7b63a7fb5e8cbaa01145276f24f12df03fe5df39a94459cb52f5b110b2f3724827a35e0539df43e9fa6dbedbbf0d7f1b3bc4be
-
SSDEEP
3072:37kNA7T8j6VlpvBd90i/SmWKLi7CjFSivnfu3fbMdozt5cz0R7:37X0UGKGkFRKfeoztOY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 11c43fe140d60ebeecfe7ee3b1120cd8.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cuexu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 11c43fe140d60ebeecfe7ee3b1120cd8.exe -
Executes dropped EXE 1 IoCs
pid Process 4012 cuexu.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /h" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /e" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /i" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /x" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /a" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /m" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /z" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /m" 11c43fe140d60ebeecfe7ee3b1120cd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /r" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /o" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /c" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /l" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /u" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /v" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /j" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /w" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /n" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /f" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /k" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /b" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /q" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /g" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /s" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /d" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /p" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /t" cuexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuexu = "C:\\Users\\Admin\\cuexu.exe /y" cuexu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2104 11c43fe140d60ebeecfe7ee3b1120cd8.exe 2104 11c43fe140d60ebeecfe7ee3b1120cd8.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe 4012 cuexu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2104 11c43fe140d60ebeecfe7ee3b1120cd8.exe 4012 cuexu.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2104 wrote to memory of 4012 2104 11c43fe140d60ebeecfe7ee3b1120cd8.exe 90 PID 2104 wrote to memory of 4012 2104 11c43fe140d60ebeecfe7ee3b1120cd8.exe 90 PID 2104 wrote to memory of 4012 2104 11c43fe140d60ebeecfe7ee3b1120cd8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\11c43fe140d60ebeecfe7ee3b1120cd8.exe"C:\Users\Admin\AppData\Local\Temp\11c43fe140d60ebeecfe7ee3b1120cd8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\cuexu.exe"C:\Users\Admin\cuexu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4012
-