Analysis

  • max time kernel
    174s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 20:33

General

  • Target

    b81f03a7b0f27008d02a56141505b177.exe

  • Size

    260KB

  • MD5

    b81f03a7b0f27008d02a56141505b177

  • SHA1

    ee2d317281a39ecfeb927ed58497b4e80c954822

  • SHA256

    6602bb869e32867841efde6707f28c8da85165c74d2ab4c528736c76bcf08b06

  • SHA512

    29cbf36d3203db0f8ce03736b3b1f154c0b01e2c840dd91b43f15087d3212aebd23aadb3190c099e03902d434647b64f99d6edc38d921fcaa73cc803c20d9b7e

  • SSDEEP

    6144:x4HSUUp7WQn6mr1R4bKLnXejKloO6JU1J7QnpRZ7Ta9kzU2/pn:xkUp6Qn6mr1R4bKLnXaKaO6O1JApvH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b81f03a7b0f27008d02a56141505b177.exe
    "C:\Users\Admin\AppData\Local\Temp\b81f03a7b0f27008d02a56141505b177.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\youmib.exe
      "C:\Users\Admin\youmib.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\youmib.exe

    Filesize

    260KB

    MD5

    07d4a1a9dec95a8a035466d44b3c3afe

    SHA1

    c74e36548a43cc0d0d2d5289c112c85a5271b484

    SHA256

    75cf604f69335f270742f04a4b48107beb8c4e684dd4f8f4d40cfcd4ac220e77

    SHA512

    1a716d8a4f0bdadf5fab5f4eb18daf133c7221af57db59a9a5188a0f718d4bbff4ed2e2eb0b2fb70fd7ce9f3eb7dd52e36b391d9611a2a6c25d7737234f224ca