Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 06:25

General

  • Target

    babe215ff77078113313eff8161945bf.exe

  • Size

    152KB

  • MD5

    babe215ff77078113313eff8161945bf

  • SHA1

    ba7f0d54a5bf5bd8d3e06ee2e1b4b160905c68c3

  • SHA256

    4422e11047ddb8f2cc9926337530aed01a1a7938f399763fba22edccd572bb86

  • SHA512

    1490acfc6636c0ed2433bb9ec8bec6217134478e01988ca6ce92d67011450c47fd9ff53caa7393a2eea259dd0ecce5a700eaa183632483af4cf4242786e15d92

  • SSDEEP

    3072:WjjxMuf9SCDGZRImwnpDT/B660vYSrwCL8sN01jsvmus0I:WOu5SREnpDT/M60vYSrwCLSsv/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\babe215ff77078113313eff8161945bf.exe
    "C:\Users\Admin\AppData\Local\Temp\babe215ff77078113313eff8161945bf.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Users\Admin\swdiy.exe
      "C:\Users\Admin\swdiy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\swdiy.exe

    Filesize

    152KB

    MD5

    5043b51a50556f0b57f8cd4638c621f7

    SHA1

    e3ee7b5be45e789c4c6a8dd7e449b3579db6d993

    SHA256

    c716971bed73df04f2a897b336c0d8f85a53483b8ab05212c19df140c3f9fc11

    SHA512

    ffdb9c3b4f19b4f3a834bad60a09c3755a77beb0629cdb92694987f142ea9d73aaa21d58e9d22df03129545089e04a0667a461df1e28cb1e4fe5632f55e000da