Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
755d36df2791624141aba122e61f68d1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
755d36df2791624141aba122e61f68d1.exe
Resource
win10v2004-20231215-en
General
-
Target
755d36df2791624141aba122e61f68d1.exe
-
Size
68KB
-
MD5
755d36df2791624141aba122e61f68d1
-
SHA1
f17d82763454de3e9223cfeb009c996932bdfafb
-
SHA256
eafcbca25eda278dae14f6c7e50de16d65a89abe1e40a8ff2a3cb1d4d3b8a894
-
SHA512
2ddb0a1d44e03bcdccdbead253db040fbaa4450282d79e280baf9945d872764240d712caf7c16a1377bcb495902f7463f45547c1b1c9dd6fa8ecc00c68bf54f6
-
SSDEEP
768:zcPliTd+GoAAl+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:4PIx/oAAcqOK3qowgnt1d
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 755d36df2791624141aba122e61f68d1.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 755d36df2791624141aba122e61f68d1.exe -
Executes dropped EXE 1 IoCs
pid Process 3512 Admin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 755d36df2791624141aba122e61f68d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe 3512 Admin.exe 2384 755d36df2791624141aba122e61f68d1.exe 2384 755d36df2791624141aba122e61f68d1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2384 755d36df2791624141aba122e61f68d1.exe 3512 Admin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3512 2384 755d36df2791624141aba122e61f68d1.exe 89 PID 2384 wrote to memory of 3512 2384 755d36df2791624141aba122e61f68d1.exe 89 PID 2384 wrote to memory of 3512 2384 755d36df2791624141aba122e61f68d1.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\755d36df2791624141aba122e61f68d1.exe"C:\Users\Admin\AppData\Local\Temp\755d36df2791624141aba122e61f68d1.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD59ff8df49bfa9c55107f7e0be5b3e07bb
SHA1db44c6f19b65efa13c87ee82462b0652ea81b5a9
SHA2566b1341b874297f2353e639059d42574c00ec60aac98b8ac31c9a890af5a02845
SHA512ebd00c334ee0847be131a0ebac40a8b871ac7c52498d5fee3747bf4d086a352350582170783ec650bb2dc45386284dc709520b8ba75d335ca8ede007ae6809de