Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2024 09:08

General

  • Target

    7f724f16e198623f22bce89fa06d8c4e.exe

  • Size

    216KB

  • MD5

    7f724f16e198623f22bce89fa06d8c4e

  • SHA1

    3fa152bc31516cfb650b922437862cd9ae41bc64

  • SHA256

    53a8ce69fa26961c132151a90a3acf2681f4b7c9960813d9a8a41b6b83e4561e

  • SHA512

    beba08f2a0e4de82e74086266060a8bd731a250e5f4a123d923ce5a847ed9f26123acab7716ea049ae8b6b631beb52ac8f992da711f4ab195ae932272da7d514

  • SSDEEP

    3072:SFvdCkdoHFGFooobAqzNOEbOKZbtpGPsLxN:SFv0NPseNmKJtpLN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f724f16e198623f22bce89fa06d8c4e.exe
    "C:\Users\Admin\AppData\Local\Temp\7f724f16e198623f22bce89fa06d8c4e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\tdbaak.exe
      "C:\Users\Admin\tdbaak.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tdbaak.exe

    Filesize

    216KB

    MD5

    0575bbeee0efaf70e6f806cbf0404a29

    SHA1

    267da35c7a70ee8993f1c0b63b28b064852cc816

    SHA256

    4683befb7b4303bb04725e91673eae23b64474ea0b8594fb60836c03066369a1

    SHA512

    4793cff12eea1a40610b2cb26f882f3e7e832b9eda5e94f3c2d2ec6da45f8f828d89c9b23fec17806ed2110827da06e9e100f0946d65c391cd75aa872e333d2b