Analysis

  • max time kernel
    145s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 07:32

General

  • Target

    123adfadb6ad192aaf86c124cc9e08d7.exe

  • Size

    152KB

  • MD5

    123adfadb6ad192aaf86c124cc9e08d7

  • SHA1

    3f42d48ccbc4f0aa4e7d94c8f0b00401b5854f43

  • SHA256

    1aa09bb035a019fcd623b598821b880c60b90e6433001c3c638f82f3e511558f

  • SHA512

    29d2355e950a42dbf4d63be0afd1d5b3a9a7fb9e3ea2d83e8ff220d85ec142e42477b9181c758cd0578a4cd07956482c82aeeabf2250ccffe5ad721b2066cfb5

  • SSDEEP

    3072:1vhHSyzi+XQP4/EndwEC+zOdO7VefRYcYN1rjGTxr4oQZiEs0y:V3W+XH/En64OdkoxblFWat

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\123adfadb6ad192aaf86c124cc9e08d7.exe
    "C:\Users\Admin\AppData\Local\Temp\123adfadb6ad192aaf86c124cc9e08d7.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Users\Admin\daibia.exe
      "C:\Users\Admin\daibia.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4252
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 644
        3⤵
        • Program crash
        PID:1100
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4252 -ip 4252
    1⤵
      PID:2872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\daibia.exe

      Filesize

      152KB

      MD5

      19ad56f92ae89c29a844837540e97d66

      SHA1

      ecde151a8992b799af6653b7ee1e5f94b0eddc63

      SHA256

      8ed63c0844eabe176e57b1c6a6e86ed9efe4a7ea37277d30f68ba94e9d04d10d

      SHA512

      b93f329b55dde1a85bb7fd3714adbcc8c5af895234e0fee97f9e9c2d9874261e97ff9fb4b50fbc594aa5aaac91459d374e86e97c94a876d1fd160830b9bc2b75

    • memory/4252-34-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4252-37-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4812-0-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4812-38-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB