Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 16:48

General

  • Target

    65887337509f6407b762ac1c7daa02fe.exe

  • Size

    152KB

  • MD5

    65887337509f6407b762ac1c7daa02fe

  • SHA1

    742979d0549e5d3fbdfd9968a83d0d8ffc8dcd50

  • SHA256

    7f8e53865f07357bfcd0c814ea8e19c9fbf6dcb6a46d42c3496ad108d23f3789

  • SHA512

    7e07c34156b783c078c3bea1380d928b9989639d65f424011993e58bccce1f43bbb0b573c9270a0659c5ee6019125d51c9c6ba4a8a7aacae0010408ccfad587e

  • SSDEEP

    3072:9MG2PYYh0ZR+7DxNUbaxIcz93bOButK+Fol:r+7DxVh3bHCl

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65887337509f6407b762ac1c7daa02fe.exe
    "C:\Users\Admin\AppData\Local\Temp\65887337509f6407b762ac1c7daa02fe.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\lspeud.exe
      "C:\Users\Admin\lspeud.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lspeud.exe

    Filesize

    152KB

    MD5

    14d96197a37207d947449f07283f96b0

    SHA1

    5ffde5b4b3cea599e8b7cb8b74ab54afca2fc7af

    SHA256

    61d19776583e7adc2da2528bf0b2ac05fee870b3cec111250492e0db8b9b6673

    SHA512

    2a7e4b367c643fc57f9317ec198cd785f4056955f17c9c2de87132d1b25040d19e8a154067f53d772b4225ad2b80f89e2db482493965afa163515baac72ad687