Analysis

  • max time kernel
    161s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 05:57

General

  • Target

    98a5c8ef85c3e1a1db2162e0da2fb7ee.exe

  • Size

    156KB

  • MD5

    98a5c8ef85c3e1a1db2162e0da2fb7ee

  • SHA1

    10bf7efcf63d37dcc9fcb1457560f1804f16974a

  • SHA256

    3e6e580b858b29c962266a76471aae36c2df80e0d799842e07344c733d31e368

  • SHA512

    87ddf5cc2dbfa52c9bf4b4e5b7d4927d35cf1b45b17ae954458a4ff9b267400a477b3921eebd84996941f25c3b84ed732f1e5211596ee6ae1f67e6eb7d101118

  • SSDEEP

    3072:bAEcTATe0pBI1xkaGU0vBpT8k/QvbawuxtUYqBd5hAmamQAMHfhRvuWxx0g4oQZq:bXc4e0pBI1xkaH0vBpT8kltDr8L5DMHZ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98a5c8ef85c3e1a1db2162e0da2fb7ee.exe
    "C:\Users\Admin\AppData\Local\Temp\98a5c8ef85c3e1a1db2162e0da2fb7ee.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\nokul.exe
      "C:\Users\Admin\nokul.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\nokul.exe

    Filesize

    156KB

    MD5

    00c32b21eab4d1d6952c48724a80fddd

    SHA1

    3388e97fce44b2532be6f025fe5ee4896e3e86da

    SHA256

    bc21b0fef7079f5efb4ad9f1b697de68b0c41830e56361ea77f450124709cc20

    SHA512

    bd50a0cf70462e85730f4f2e53effc748819b4f13e78c6b39e20dcfcd0f73860987dd68149d8f4df2c397da50079248a955c4284a922fc6cfe20f31515d259af