Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 14:09

General

  • Target

    393e70e101d66920905a8213c9eeb218.exe

  • Size

    264KB

  • MD5

    393e70e101d66920905a8213c9eeb218

  • SHA1

    c2f276a563d06a7a563ee880aaa990be6cfd2bae

  • SHA256

    2d4c9caf643d938554c5fba3ca06aa252034c10089f4449ee3254ab22aaba556

  • SHA512

    e82f8b77d66b501fa808f59d9d9833ed3f5ebabbff6f188e9bb6a7074cbe92c0443d71a39980c8011b3764c092194b9e7f54f2a0eb1b132a31a2aab84551406c

  • SSDEEP

    6144:0r+XI/3JJYHyxyIVEA4aZM9DRruwcu3zChvQ:O+XcvHmzKu3zChvQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\393e70e101d66920905a8213c9eeb218.exe
    "C:\Users\Admin\AppData\Local\Temp\393e70e101d66920905a8213c9eeb218.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5024
    • C:\Users\Admin\nuame.exe
      "C:\Users\Admin\nuame.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\nuame.exe

    Filesize

    3KB

    MD5

    42c6351f4fa57f68b4bd61c423eebcc7

    SHA1

    495be8c9203e6111428bcc18aa06d7b6fba79b6b

    SHA256

    e51c9d26b27c24bde1ccd8b12ecf59e50d7ad8d5bbc7a634f3468984791be250

    SHA512

    f7d1e2874b4edf4af29860f3e83524258d52272c95f1db36a4107acecab795573476cbcc541fa0a2ba338425a32d2ebfa149a637f858fa5f285d2f56415117ef

  • C:\Users\Admin\nuame.exe

    Filesize

    264KB

    MD5

    1fe7a767f9ff08cad59d7965cc432f04

    SHA1

    e8f2d6ae4eaebbe98dfe92e5c6bc3aeb0f97858b

    SHA256

    793217da601d47d74b6a71985c96e8d7e524bfd263dbe599b8e7c831701ca2d4

    SHA512

    524d689708e11b65936547a3b1a9501d8cfaf1d8c3fbc145d82a24e4dd0bdf68db79f2dd03840847564efd99a694957dc5a5642434eae40da278587ec3e566d9