Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
5311163437ff559324b2f45636f46bc8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5311163437ff559324b2f45636f46bc8.exe
Resource
win10v2004-20231215-en
General
-
Target
5311163437ff559324b2f45636f46bc8.exe
-
Size
142KB
-
MD5
5311163437ff559324b2f45636f46bc8
-
SHA1
8ba3a0bf6d2c58b1af181c9d7eb8f8c31c2b2a01
-
SHA256
29ab3d0899ee3fc766d0acc98500ad3388b11530cd7471bb2513d614caefd0df
-
SHA512
3b4bab1020d378ae859846b1bba4ba96d00f39ba363078d279ff1e10f63f0caa693067a5d10dcf2678dc3431252c1a4d1baeb97f4d82f9a98b15f4890fcdc549
-
SSDEEP
3072:BdxX0Fpx9KQcJJ78IrDlq2RzFq247DCLTzltNSFN9b23y0PEOmuHw794rK9fz8iY:BP0l9KQcJJ78IrDlq2RzFq247DCLTzlG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tdwog.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 5311163437ff559324b2f45636f46bc8.exe -
Executes dropped EXE 1 IoCs
pid Process 1788 tdwog.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tdwog = "C:\\Users\\Admin\\tdwog.exe" tdwog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe 1788 tdwog.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3076 5311163437ff559324b2f45636f46bc8.exe 1788 tdwog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3076 wrote to memory of 1788 3076 5311163437ff559324b2f45636f46bc8.exe 92 PID 3076 wrote to memory of 1788 3076 5311163437ff559324b2f45636f46bc8.exe 92 PID 3076 wrote to memory of 1788 3076 5311163437ff559324b2f45636f46bc8.exe 92 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87 PID 1788 wrote to memory of 3076 1788 tdwog.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5311163437ff559324b2f45636f46bc8.exe"C:\Users\Admin\AppData\Local\Temp\5311163437ff559324b2f45636f46bc8.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\tdwog.exe"C:\Users\Admin\tdwog.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD58c5f642de040b4f8d487ea543f5be741
SHA13b508f5ab9086e3d27cef56565af775c11df3465
SHA2567282931d463283e5695e8154dfd88a5049fc009fa37c051f62c90d4ea89d2cd6
SHA512302b2c9d9f928e2070a39fa7c960a17b18e5f0a3fc899d2fa8ac58ec6a1dbaf6de63597810b4297b00a75aa630e62a96b0475d7277d8a28270385a590b80ec76
-
Filesize
142KB
MD598cbf0cea3cd18a6ee26628120d50bae
SHA1dfae41e47b707785a964a086d5e570720517f123
SHA2566b4f7f5e058c80fc52dc74dea2865877958e2118fb07585c50b9c14e40122948
SHA5128f8aab3ef17b90446c76f8c12484f8ae6f35ec5f9d75eeff6b3f77e2a2a5f94bb3bd02ad0e68ad411ad73128cfd0e94c63a3f2aecb225850c0c9890a4f261bfa