Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe
Resource
win10v2004-20240226-en
General
-
Target
b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe
-
Size
88KB
-
MD5
fce5c8cba6853dd979bb0a9270e7645e
-
SHA1
47777519c70b47643c14b7eaa4231ec9d25b2578
-
SHA256
b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5
-
SHA512
aa676dfb95d4d384ed079b74ef53e157c2edf0c30b65b1f6d58b06736c17bb69fd9e1972993297b88551d4f15f802fbf51bade3b7564d7b256ae1c3eaa0715b9
-
SSDEEP
1536:sxmj9IQ/JDHKa5LJW6/Z2NZQKvdmNmS/:4mRI8DHKuFOJvdN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hiuavot.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe -
Executes dropped EXE 1 IoCs
pid Process 4996 hiuavot.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /b" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /j" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /o" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /n" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /h" b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /s" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /f" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /l" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /z" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /e" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /r" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /q" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /k" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /i" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /u" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /y" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /c" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /g" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /m" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /w" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /h" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /a" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /t" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /v" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /p" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /x" hiuavot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuavot = "C:\\Users\\Admin\\hiuavot.exe /d" hiuavot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4000 b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe 4000 b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe 4996 hiuavot.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4000 b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe 4996 hiuavot.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 4996 4000 b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe 94 PID 4000 wrote to memory of 4996 4000 b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe 94 PID 4000 wrote to memory of 4996 4000 b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe"C:\Users\Admin\AppData\Local\Temp\b4097a990fe34d6a2395cbcba556167135de48cad28245d90aca700457721ca5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\hiuavot.exe"C:\Users\Admin\hiuavot.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD55e5e216b1a45cda7a6e016d7a91b195a
SHA1ef3a949276e94589fd66d24126c0137b536eca40
SHA2565b20c923551e85ece232eba22c581d5fd6f25f39a6bf0025e32c87590968e011
SHA5125287a50ee4be534d226f3f3ca6ff30d5b3ce8e5725feff18ca67ccc8f1bc65db3d940affbaae3b4cbbc2bd81160e6cbcd3cb395a7361c0d143172bbff1218e3b