Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2024, 15:54

General

  • Target

    3507aad330851a20a2e5ed184e812f47.exe

  • Size

    228KB

  • MD5

    3507aad330851a20a2e5ed184e812f47

  • SHA1

    8565967cf286c774ceab82661aa1a34f80b14e82

  • SHA256

    40bceabd84c21beef6781fbb5bc6c57defe11e6c87744c77f3e322ddc65dc114

  • SHA512

    1ef15972964567fe52eb639ece01c0ae4f0d6c43d8a1e0a52ec4fb553d059065a79cc4d78ed67dd9b39a8bba6f03e35392d9828a5cce750611adb71ec6d0e823

  • SSDEEP

    6144:fm03PFKs7aFwKWwalhrEqxF6snji81RUinKZHg/ASk:fmuPhAmZIH+Ap

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3507aad330851a20a2e5ed184e812f47.exe
    "C:\Users\Admin\AppData\Local\Temp\3507aad330851a20a2e5ed184e812f47.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Users\Admin\jqseod.exe
      "C:\Users\Admin\jqseod.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jqseod.exe

    Filesize

    228KB

    MD5

    84b6eb2d60b6dc0ea39b055574c8ca4b

    SHA1

    1c4925a48e87d08f9cdfae7457fdb97cb7c6a5b2

    SHA256

    49b1f410ea7e6f9b5224cb32caf48469e2aa493b753aa5f3b652c2520d090f66

    SHA512

    8884757132626d9124608c4856abe3fd48117e45cbdfffbd043f83ed17078ce71ecd2dd3f0ca0a6a675dfddf09eec66269d9e556bd704de041c680fba056ac06