Analysis

  • max time kernel
    158s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 13:48

General

  • Target

    1a89fe17499bc3d3d87057232fc768ed.exe

  • Size

    204KB

  • MD5

    1a89fe17499bc3d3d87057232fc768ed

  • SHA1

    a185c38bbae5492b22f062cbd3d88cd2bf2253db

  • SHA256

    474bb149cf9553eca0e0429d18443f3be17b267c2de587db6e16644a68fc90bc

  • SHA512

    8f8827e57a328c7dceba5db0202b91cf32b3f0688a0a752a91029b77d2545fa87b9f6786c9184397b6663468770c290d8bdde3824db3ef98319cb9df03a8f69e

  • SSDEEP

    3072:UuqeZBXj3pZgjxp8HRfW+Ida220gN4JsBi40BuWNVYrcLwcYieNRrhomiyTfXIK:UFyxDpZgdORfWTmiDBuhTIaxu+7qT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a89fe17499bc3d3d87057232fc768ed.exe
    "C:\Users\Admin\AppData\Local\Temp\1a89fe17499bc3d3d87057232fc768ed.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\rcrad.exe
      "C:\Users\Admin\rcrad.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rcrad.exe

    Filesize

    204KB

    MD5

    db01f269a5bc966d5b92edfa4b404369

    SHA1

    fb084e720800a2d46d941570deda06ec5b660bc9

    SHA256

    7c150271fac1c598e20fa0b31e82d8acf2de999141a8561c03e7109647cfd16a

    SHA512

    9c4148e3f9507950353d1dfe9ca570fa3cec51afce0f18fff83ccce49048e2085ccfb7a18742ad49ec129b58e714437c8df23942dcef24a683b1ca32ccc67a56