Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 23:44

General

  • Target

    cb014fe5c07a2fe01ba099a73a188b6f5530dc354c2e3b84c2c13ec5f4424048.exe

  • Size

    216KB

  • MD5

    000e3b49539c7a05bd04ce3626f8cd19

  • SHA1

    f2455b37eb2bc1dd2d89e8efd16874803cbf2903

  • SHA256

    cb014fe5c07a2fe01ba099a73a188b6f5530dc354c2e3b84c2c13ec5f4424048

  • SHA512

    b0693268653881b9bfe105445b40a9e2d1f7cb20b4b1e391d16a9c856101b4432c7064685cf75592d8678c3f9bb101a9624f6b802c3398b7e3faa2f3ee2374bc

  • SSDEEP

    6144:H2fIfrt3+TetonBi3QxRy4g09ICSnqf9uSUgkxtpsaPjK/bEoK828fwAoEn+MM:H2Irt3+TetonBi3QxRwfnqf9uSUgkxtZ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb014fe5c07a2fe01ba099a73a188b6f5530dc354c2e3b84c2c13ec5f4424048.exe
    "C:\Users\Admin\AppData\Local\Temp\cb014fe5c07a2fe01ba099a73a188b6f5530dc354c2e3b84c2c13ec5f4424048.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\yeode.exe
      "C:\Users\Admin\yeode.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:408

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\yeode.exe

          Filesize

          216KB

          MD5

          40ad6d074f429d802d133dced9abc628

          SHA1

          2bb7272bcb5436d6b184fc2e4169e4f07eae1e05

          SHA256

          a1c1f3b92fe9769ddb231ed4d2b18a0dcc4b7fa4e9367baf8f81bc098043556d

          SHA512

          87cc25cf026a8550d2259c62a7d3f06a84b05aca5012279f8a008ae55527c3e61572c73005ed1156698069cb3af9e15adaffba65044066bc78330a5d49d69747