Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 10:41

General

  • Target

    c063fc6d177f79ead4366c80200c4eda.exe

  • Size

    280KB

  • MD5

    c063fc6d177f79ead4366c80200c4eda

  • SHA1

    43b1daab2da2a51ca23326f5e39dd16a939cd9b0

  • SHA256

    351eff0f25043d5dec4b7fc4cad03cfbd1a622d29c2a72395953c87f02d6b26c

  • SHA512

    e91c88d69f7ccd33cf05ca1ce31cb207f91d477d25b93b9717ed2ba86125406eaabad39162745593a47a9cfd0071f0c6b4d670c2d9b32fda1978a761eba3ef54

  • SSDEEP

    6144:KIYIpydVsZyxyK5R8GYKi1Xfvs1tzH51t+ewSReXNc/W:6uydfiebOiW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c063fc6d177f79ead4366c80200c4eda.exe
    "C:\Users\Admin\AppData\Local\Temp\c063fc6d177f79ead4366c80200c4eda.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\qaaolo.exe
      "C:\Users\Admin\qaaolo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1588

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qaaolo.exe

          Filesize

          280KB

          MD5

          6392845d9dc0ad920fd04e522fb0002e

          SHA1

          1bebd846a7737e9217b2571fccbb866938539097

          SHA256

          076be01e351b7d062e7e5d7418de4cee8190853192c419b2d4ac964142d1f097

          SHA512

          73d81ab23723ab3da270bdd42d41a8f3d938da6bdeb9f71132eea0770cfcaa0bec001ddaf524b53137357e459be7ce22734b3278dec754a108cc8b973e04f132