Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 08:46

General

  • Target

    5311163437ff559324b2f45636f46bc8.exe

  • Size

    142KB

  • MD5

    5311163437ff559324b2f45636f46bc8

  • SHA1

    8ba3a0bf6d2c58b1af181c9d7eb8f8c31c2b2a01

  • SHA256

    29ab3d0899ee3fc766d0acc98500ad3388b11530cd7471bb2513d614caefd0df

  • SHA512

    3b4bab1020d378ae859846b1bba4ba96d00f39ba363078d279ff1e10f63f0caa693067a5d10dcf2678dc3431252c1a4d1baeb97f4d82f9a98b15f4890fcdc549

  • SSDEEP

    3072:BdxX0Fpx9KQcJJ78IrDlq2RzFq247DCLTzltNSFN9b23y0PEOmuHw794rK9fz8iY:BP0l9KQcJJ78IrDlq2RzFq247DCLTzlG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5311163437ff559324b2f45636f46bc8.exe
    "C:\Users\Admin\AppData\Local\Temp\5311163437ff559324b2f45636f46bc8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\tdwog.exe
      "C:\Users\Admin\tdwog.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1788

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\tdwog.exe

          Filesize

          92KB

          MD5

          8c5f642de040b4f8d487ea543f5be741

          SHA1

          3b508f5ab9086e3d27cef56565af775c11df3465

          SHA256

          7282931d463283e5695e8154dfd88a5049fc009fa37c051f62c90d4ea89d2cd6

          SHA512

          302b2c9d9f928e2070a39fa7c960a17b18e5f0a3fc899d2fa8ac58ec6a1dbaf6de63597810b4297b00a75aa630e62a96b0475d7277d8a28270385a590b80ec76

        • C:\Users\Admin\tdwog.exe

          Filesize

          142KB

          MD5

          98cbf0cea3cd18a6ee26628120d50bae

          SHA1

          dfae41e47b707785a964a086d5e570720517f123

          SHA256

          6b4f7f5e058c80fc52dc74dea2865877958e2118fb07585c50b9c14e40122948

          SHA512

          8f8aab3ef17b90446c76f8c12484f8ae6f35ec5f9d75eeff6b3f77e2a2a5f94bb3bd02ad0e68ad411ad73128cfd0e94c63a3f2aecb225850c0c9890a4f261bfa

        • memory/1788-34-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/3076-0-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB