Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 16:42

General

  • Target

    bbc03fc6d7b83a28a37eb1a2419058f2.exe

  • Size

    84KB

  • MD5

    bbc03fc6d7b83a28a37eb1a2419058f2

  • SHA1

    1946daa87b71440af4f238fb4a9dd00b6250b7f0

  • SHA256

    53b4b813df5467e387a7c2813c0585d2f95e2ca4ec6758be78591f8663319082

  • SHA512

    09b47f51c3c2c82c8978600dc542cbc6d158b6a87c3256c0955bdaa43ec15ca19906d6efc4f96b77f5e647b64f86e4ffd4681019c35f9e070be58ff254daed3e

  • SSDEEP

    1536:v78yfa7bg4htUVGLG/wXJYeUj27dTGHq13i6E:jEUVeG/wXJY527Y

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbc03fc6d7b83a28a37eb1a2419058f2.exe
    "C:\Users\Admin\AppData\Local\Temp\bbc03fc6d7b83a28a37eb1a2419058f2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Users\Admin\beoevu.exe
      "C:\Users\Admin\beoevu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1972

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\beoevu.exe

          Filesize

          84KB

          MD5

          3d47aea273ae315c6977b6bea3364ee3

          SHA1

          1ae89934592dedac5cf05e96ae05a99aedf48d23

          SHA256

          8dbfb5d7b79c1fbbc195577eaceafc25a5eb38ad0a896273937142d55a98efd6

          SHA512

          f63a609407752448bb844b821e1a0bbc28d3857bed2ad4ce106aaf6be0a66914cbb37431777bd3c306a2b991bac38eb8e5dbee61e756121722e8e556bb165490