Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 22:52

General

  • Target

    8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe

  • Size

    204KB

  • MD5

    a8165af7b5314d690f8bdd0933b297e9

  • SHA1

    a075ff6fbc25d956a0feea0b6c63b8e91f80c522

  • SHA256

    8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3

  • SHA512

    3c443b84914a4cf9893f8d6d447708b510fdcb5da24d9cd8ab13154b3ead988c915ee2681837a41c1714bfac51af03f4cde78523002f11ad8291f47486eda830

  • SSDEEP

    3072:omRW8NC0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWul:zAOC4QxL7B9W0c1RCzR/fSml1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe
    "C:\Users\Admin\AppData\Local\Temp\8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Users\Admin\quyaw.exe
      "C:\Users\Admin\quyaw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\quyaw.exe

    Filesize

    204KB

    MD5

    49b289cdc592c88afb681b910836d8d3

    SHA1

    4890e7a880e7233c32faa3f90653d40c2f57e1ee

    SHA256

    af0629fbc35adcc1664e1c35e8b0b27d664b78640508db04d5f6cf1c6ca044da

    SHA512

    2c01fbf18f6471d960605549f7129abbc44bf595c56fd4aec65fa1c0f8c72cd53ea9c81560b8b9d5eb3b4dc3046928173a6a00d7fca8fc3717ce1e7356aaa429