Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 04:00

General

  • Target

    73ae7939eeda4791a97e2ec51908ce3f.exe

  • Size

    96KB

  • MD5

    73ae7939eeda4791a97e2ec51908ce3f

  • SHA1

    2a66e85605d3dd2cbe6cd5a47d3a5c550d48762b

  • SHA256

    2cc0e3e2f585797e4828f5100cb65ea8fe5a31479ace39d9d80f6a4caa196f40

  • SHA512

    528ab7a8f3d1a58b4faa9f9e193b9d3e94b4e8c850a4cce7a828662b08cbba0bf00504de83f564a37bc19eb7333828b052e112a556ddec2f848c488a77718c16

  • SSDEEP

    1536:fslEg5229tyVQO8P8ych9Ewjj3RJNEo/knRzdnynE7RldNEP8lijOevNIjnZ5:fME/2elychrzR3Ek65RldqvCnn

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73ae7939eeda4791a97e2ec51908ce3f.exe
    "C:\Users\Admin\AppData\Local\Temp\73ae7939eeda4791a97e2ec51908ce3f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Users\Admin\nuiar.exe
      "C:\Users\Admin\nuiar.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4920

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\nuiar.exe

          Filesize

          96KB

          MD5

          4848b622fccded7bebbec98a0be112db

          SHA1

          bb9f81ae3e9eb7046808a7e566341ddea16bad61

          SHA256

          254a329f7ef84066f41d4ce09916a64dc3d5fdf3d7a94de6fbdd7eeb261bdae1

          SHA512

          0efda59b9305b09fc2e05f5ff43690cf73046a4cffaee780f84a821145078319d322890b53b1d5fdcb6319b0f5070deed764c6123de8c8d467b286ca4aa9dcc1