Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
533f3e3dae130997eca7e96a26cb8e43.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
533f3e3dae130997eca7e96a26cb8e43.exe
Resource
win10v2004-20231215-en
General
-
Target
533f3e3dae130997eca7e96a26cb8e43.exe
-
Size
40KB
-
MD5
533f3e3dae130997eca7e96a26cb8e43
-
SHA1
8593781a9c5095380afeb1e27a7f298249afd22a
-
SHA256
bddf6a7c02bdbc7cba210436eafb3da032a2f7d4443d4fe5fcd61542a93b88c8
-
SHA512
a42c6e8fefbf6b9777cffb4b9a251aff86de3adebfa59cb41ac6f113e310f8693ddeee6ad49dd6aaeb3a3e8b33e0d8fb282e772bfaf7927deb983b836597e788
-
SSDEEP
768:uKmfIz1XuGvHi6OpY9x0dHXOHk3CCecGH9C/vc:uMzHvHi6IY9x6w4RCsvc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 533f3e3dae130997eca7e96a26cb8e43.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 533f3e3dae130997eca7e96a26cb8e43.exe -
Executes dropped EXE 1 IoCs
pid Process 4020 Admin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 533f3e3dae130997eca7e96a26cb8e43.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe 4020 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3136 533f3e3dae130997eca7e96a26cb8e43.exe 4020 Admin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4020 3136 533f3e3dae130997eca7e96a26cb8e43.exe 97 PID 3136 wrote to memory of 4020 3136 533f3e3dae130997eca7e96a26cb8e43.exe 97 PID 3136 wrote to memory of 4020 3136 533f3e3dae130997eca7e96a26cb8e43.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\533f3e3dae130997eca7e96a26cb8e43.exe"C:\Users\Admin\AppData\Local\Temp\533f3e3dae130997eca7e96a26cb8e43.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5d22b46494b98c6eae6f63aaccc4d7b89
SHA119330434680d5e822dcc09fa9784d57640bc7f33
SHA2569f9a86564015dc094f37605cb3baf6f6a9e5ebc3b1ea5c00c58306caa27a8456
SHA512a54a4bdbfba6b126ed0f580c14fdb3952bada361505cd80d46b6d4209dc8351dc63a67d411256cf5b69f1ba02797445cfa37e23d7e8ad59f1e00f58d68f83b8d