Analysis

  • max time kernel
    201s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 11:19

General

  • Target

    3cb5c4680d1143e6e24fc5e1a9c1aa6b.exe

  • Size

    240KB

  • MD5

    3cb5c4680d1143e6e24fc5e1a9c1aa6b

  • SHA1

    180ac7df0027964a80ab1c60a706d278be630a23

  • SHA256

    5b668735265bef06fca6c5d3ea333c358fab200b3e6f2493e5b2dcbbd85f9345

  • SHA512

    1e0522bbdefa1a02436673365d19948794a2fa61b533e1b9f8ca2ee06852341c11a87629d9bd45dff2bc52f474ffa54e72bf07915ebda040d1b13c865e9c7715

  • SSDEEP

    3072:ykBGrT8j6VlpvBd90i/SmWKLi7CjFSivnfu3fbMdozt5czII:yX0UGKGkFRKfeoztO

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cb5c4680d1143e6e24fc5e1a9c1aa6b.exe
    "C:\Users\Admin\AppData\Local\Temp\3cb5c4680d1143e6e24fc5e1a9c1aa6b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Users\Admin\waibei.exe
      "C:\Users\Admin\waibei.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\waibei.exe

    Filesize

    73KB

    MD5

    145c6c8fd3bbf93a8c11b6c9dfbe785d

    SHA1

    ad4c900f716c3d790e15dfc19be6d4c3451c7b34

    SHA256

    a5d23fa4dd4f64f0d537bc0c37e0b452b0bc6950e4ef2f7e1957b684df877481

    SHA512

    bd5d0c4dd015a2f7f38f6235715cbae86bc7d12d0ff79c6b7c20ee3a785526b7f0531baf4b45295c8d59a521fc53ee83e6c6e0f2bcdd3f6c92707d4a2d49f657

  • C:\Users\Admin\waibei.exe

    Filesize

    54KB

    MD5

    2205828d7f6055b5a2923186601ed22a

    SHA1

    8d4432ba21a3e60c3d177bae54b8f3044c2726b6

    SHA256

    a67fcc0483901a0d86f2d939c5e27194f14239a5eb10cf0b9fe7b514b07f5972

    SHA512

    13ba4a88fdadf57aaa82a835290505e3551826e8ba85046b613d33efb8f49fb10a25d442c3b1f350020a69bc49fadb1225062fba49ab93206a1083f3ece70714

  • C:\Users\Admin\waibei.exe

    Filesize

    83KB

    MD5

    3520abe42efdc73908a2931950fa1211

    SHA1

    157a972c521666e140b0d8bff793850e5fabb768

    SHA256

    d4e36ea38bd33b58cecd453c74e5cd76c791bfe508b41fe9b62c801b065cc1d8

    SHA512

    adfd636c7a17859392e254229c46d23e4dc5d3978f126e56a63cd280be2d0929e3759ce1709a901af19c2edc67f4ba4e8eb9c87485697206fb5c1372f02e1b6e