Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 05:21

General

  • Target

    a10c263af6e8182dad8405fcfcf5fb5f.exe

  • Size

    296KB

  • MD5

    a10c263af6e8182dad8405fcfcf5fb5f

  • SHA1

    f6b5cf994351983a354ab630e2b3d7923a22d19d

  • SHA256

    d48517838c4854729916b60f6c5fc84e9d6651787dbda8228ba63b30d6b84861

  • SHA512

    0f71fa5a321f1dd233dfa515425f3013d6273d9d36ab21d1e2bc5eadfdbb8efab744bd47ab267fe53c858a765d41613e315a3c5d53e9d96809092cf849770bab

  • SSDEEP

    3072:XcDwo2q+sg+swlSN9BkPFzW85u9ututumuOu+uxuOugujuju9u9ugu9uPuTu6utE:XFq+sg+s

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a10c263af6e8182dad8405fcfcf5fb5f.exe
    "C:\Users\Admin\AppData\Local\Temp\a10c263af6e8182dad8405fcfcf5fb5f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\qiemue.exe
      "C:\Users\Admin\qiemue.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3096

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qiemue.exe

          Filesize

          296KB

          MD5

          bfb7310092621e5a9108fa2b1a1d8963

          SHA1

          2b16d5bb80715e72f7e0cce478cf3b3913a822a3

          SHA256

          8034022b53510399c417a60b7ee243c966a94d922ad2c44e48dd9c11ecbc75f3

          SHA512

          78f962747479733fc39de28a033f8cd59e6ed7a6e293e6d2e0c81e0f2c8bd7700d77b75cfd9ff0e2ce9311671ff70f6880b2f972fb94a9968680b3671365f17d