Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:32
Static task
static1
Behavioral task
behavioral1
Sample
123adfadb6ad192aaf86c124cc9e08d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
123adfadb6ad192aaf86c124cc9e08d7.exe
Resource
win10v2004-20231215-en
General
-
Target
123adfadb6ad192aaf86c124cc9e08d7.exe
-
Size
152KB
-
MD5
123adfadb6ad192aaf86c124cc9e08d7
-
SHA1
3f42d48ccbc4f0aa4e7d94c8f0b00401b5854f43
-
SHA256
1aa09bb035a019fcd623b598821b880c60b90e6433001c3c638f82f3e511558f
-
SHA512
29d2355e950a42dbf4d63be0afd1d5b3a9a7fb9e3ea2d83e8ff220d85ec142e42477b9181c758cd0578a4cd07956482c82aeeabf2250ccffe5ad721b2066cfb5
-
SSDEEP
3072:1vhHSyzi+XQP4/EndwEC+zOdO7VefRYcYN1rjGTxr4oQZiEs0y:V3W+XH/En64OdkoxblFWat
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 123adfadb6ad192aaf86c124cc9e08d7.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 123adfadb6ad192aaf86c124cc9e08d7.exe -
Executes dropped EXE 1 IoCs
pid Process 4252 daibia.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daibia = "C:\\Users\\Admin\\daibia.exe /M" 123adfadb6ad192aaf86c124cc9e08d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1100 4252 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4812 123adfadb6ad192aaf86c124cc9e08d7.exe 4812 123adfadb6ad192aaf86c124cc9e08d7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4812 123adfadb6ad192aaf86c124cc9e08d7.exe 4252 daibia.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4812 wrote to memory of 4252 4812 123adfadb6ad192aaf86c124cc9e08d7.exe 90 PID 4812 wrote to memory of 4252 4812 123adfadb6ad192aaf86c124cc9e08d7.exe 90 PID 4812 wrote to memory of 4252 4812 123adfadb6ad192aaf86c124cc9e08d7.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\123adfadb6ad192aaf86c124cc9e08d7.exe"C:\Users\Admin\AppData\Local\Temp\123adfadb6ad192aaf86c124cc9e08d7.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\daibia.exe"C:\Users\Admin\daibia.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 6443⤵
- Program crash
PID:1100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4252 -ip 42521⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD519ad56f92ae89c29a844837540e97d66
SHA1ecde151a8992b799af6653b7ee1e5f94b0eddc63
SHA2568ed63c0844eabe176e57b1c6a6e86ed9efe4a7ea37277d30f68ba94e9d04d10d
SHA512b93f329b55dde1a85bb7fd3714adbcc8c5af895234e0fee97f9e9c2d9874261e97ff9fb4b50fbc594aa5aaac91459d374e86e97c94a876d1fd160830b9bc2b75