Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 01:17

General

  • Target

    981b953858e6068fc71394b208b751dc.exe

  • Size

    200KB

  • MD5

    981b953858e6068fc71394b208b751dc

  • SHA1

    31cbaa37b0f42959bb08eeebf5e1e22f507e3b3e

  • SHA256

    38b4737faebe3449fce04010d510239ad1c8c829f75e596f288f1224967583cc

  • SHA512

    e81994b42def790b7eca27cdae1b7caff7513b026eeb67373420d0ad324cde33d6b6019bcda9cea7254f61590c33647b1749f61dc4314c92c441a9ddc28ede38

  • SSDEEP

    3072:lC/To/0Yxr0tQ9nLHbB9WPliBs2HWWEakGJm9hi:lCmN4QxL7B9WPli+yWWEazH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\981b953858e6068fc71394b208b751dc.exe
    "C:\Users\Admin\AppData\Local\Temp\981b953858e6068fc71394b208b751dc.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:612
    • C:\Users\Admin\vljoew.exe
      "C:\Users\Admin\vljoew.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3644

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\vljoew.exe

          Filesize

          200KB

          MD5

          269a3e69b8f40f07553a2b9ffa962ca0

          SHA1

          09adf27089aa6629c89c8813c9366a2080da7198

          SHA256

          1f28eb06536423371c30183f7735022e8ac7c13262b6a193e1b528bf99054416

          SHA512

          6c0687201eb0cd7ac550db790b4afd8dcb35fbe1c5ef9c99126504fc4ccf7d1052b9c5b92478241c5a67b22d34078a87d79a6a52bc58de1825d56a1de6a8b220