Analysis

  • max time kernel
    155s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 19:20

General

  • Target

    ab0ca47e98ab9785779dd6dcc2d06e97.exe

  • Size

    272KB

  • MD5

    ab0ca47e98ab9785779dd6dcc2d06e97

  • SHA1

    e359a7a89ee454ef785b5d780535440551121550

  • SHA256

    56b7fdb4a551ee9766c50b46229aa0cd50859770ffec8d525c5429a8657314e7

  • SHA512

    e82d07a1307b9a21109c3e00ffafaa738f83101982ac8bfa43f3108ae962abd84f64181a47d1f0a19464900ae3cc00f9a24a1116f8ad4522393be7b2848406c0

  • SSDEEP

    6144:/3azmlQxchRdjLmtrBuMrdekUH63u+X5sc57br:SzTxGLTuPL5L

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab0ca47e98ab9785779dd6dcc2d06e97.exe
    "C:\Users\Admin\AppData\Local\Temp\ab0ca47e98ab9785779dd6dcc2d06e97.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\hiuen.exe
      "C:\Users\Admin\hiuen.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4884

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\hiuen.exe

          Filesize

          272KB

          MD5

          cd6679bce6434fcd13cfe459b1cc0f23

          SHA1

          9fc98052e5705b62ec6996ac3c9144b674d0d270

          SHA256

          f05567de82b8afc1a9c2cbea953ca8932f718c7972692098bc5b26d2e32dad28

          SHA512

          1f47b6b300cd14e62d8b4b31f1b122f3914d41afa07a2b0132b1aa3e86c30ddb6844129b4b73656bf2e4c33b65b8d880c52f74f47503fb93539b35a06bcce8da