Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 10:16

General

  • Target

    533f3e3dae130997eca7e96a26cb8e43.exe

  • Size

    40KB

  • MD5

    533f3e3dae130997eca7e96a26cb8e43

  • SHA1

    8593781a9c5095380afeb1e27a7f298249afd22a

  • SHA256

    bddf6a7c02bdbc7cba210436eafb3da032a2f7d4443d4fe5fcd61542a93b88c8

  • SHA512

    a42c6e8fefbf6b9777cffb4b9a251aff86de3adebfa59cb41ac6f113e310f8693ddeee6ad49dd6aaeb3a3e8b33e0d8fb282e772bfaf7927deb983b836597e788

  • SSDEEP

    768:uKmfIz1XuGvHi6OpY9x0dHXOHk3CCecGH9C/vc:uMzHvHi6IY9x6w4RCsvc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\533f3e3dae130997eca7e96a26cb8e43.exe
    "C:\Users\Admin\AppData\Local\Temp\533f3e3dae130997eca7e96a26cb8e43.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3136
    • C:\Users\Admin\Admin.exe
      "C:\Users\Admin\Admin.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Admin.exe

    Filesize

    40KB

    MD5

    d22b46494b98c6eae6f63aaccc4d7b89

    SHA1

    19330434680d5e822dcc09fa9784d57640bc7f33

    SHA256

    9f9a86564015dc094f37605cb3baf6f6a9e5ebc3b1ea5c00c58306caa27a8456

    SHA512

    a54a4bdbfba6b126ed0f580c14fdb3952bada361505cd80d46b6d4209dc8351dc63a67d411256cf5b69f1ba02797445cfa37e23d7e8ad59f1e00f58d68f83b8d