Analysis

  • max time kernel
    157s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2024, 09:59

General

  • Target

    00cbea11b439af95c3f7ccca541a2e67.exe

  • Size

    48KB

  • MD5

    00cbea11b439af95c3f7ccca541a2e67

  • SHA1

    3f56e8b1398780227ed0b8a1caf7a92f94a66644

  • SHA256

    866c02e0d3c0cce817ac7ece77915e6bd6fa6c97e45645da69aa94d1ac2a9e38

  • SHA512

    11b13b1a29252ca58b799d07acabfe29c9d3f11550cde77ad310eeb27704ef25c6dee723ad132f3faee6e4ac28416ccd5a4bf247e7ab9af3d04d3c88b316d50f

  • SSDEEP

    768:CNNEhmmgXq0b18wWv+6wH9H7MfygXaDMFQXD7e:CNamVqI8h6NNDsQXD7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00cbea11b439af95c3f7ccca541a2e67.exe
    "C:\Users\Admin\AppData\Local\Temp\00cbea11b439af95c3f7ccca541a2e67.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Users\Admin\riuom.exe
      "C:\Users\Admin\riuom.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1336

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\riuom.exe

          Filesize

          48KB

          MD5

          0d5905941e4ffec5c5578ffebd5d75ee

          SHA1

          da8b5f81511eda1624cb2c52dded6dfbe81f7185

          SHA256

          bb16551b184a863632536291c6470fd9b6769a0c31ecd1ea8e43dc2873b62509

          SHA512

          8fd6d83179312787ecf807b40c2e7387a1eaee97bc113829504f3a2e60a2775cfa044c3837744732a042d400b8efd215a43912edeaf7fd86069ceee8fa7259e5