Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 05:57

General

  • Target

    94122de0c42bd8a9dcf7fbfba81ee3c1887c2de1638d424dd60e577d48cfcb3b.exe

  • Size

    168KB

  • MD5

    6ba3969a92134ae4297a2ada9f832191

  • SHA1

    78a7d82d45112da85b727e563385b4a87243dac8

  • SHA256

    94122de0c42bd8a9dcf7fbfba81ee3c1887c2de1638d424dd60e577d48cfcb3b

  • SHA512

    86eb87bd9e52f8aed342802df52a211633f98e88517ce33e338ea153685909073be704497ba337e680cec562e95903f07c0f4904196b7e41a8d2f8ee26b2f932

  • SSDEEP

    3072:ZhMmxJptfKqOdBsebgeDyJiqmdoTtawZPotUPvPDspYxjaWL0JiTeDXokRm9M6eY:3ZDptfKRLsebgeDyJtmdo7PIWDspYJaK

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94122de0c42bd8a9dcf7fbfba81ee3c1887c2de1638d424dd60e577d48cfcb3b.exe
    "C:\Users\Admin\AppData\Local\Temp\94122de0c42bd8a9dcf7fbfba81ee3c1887c2de1638d424dd60e577d48cfcb3b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Users\Admin\fieya.exe
      "C:\Users\Admin\fieya.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fieya.exe

    Filesize

    168KB

    MD5

    8d51dae52ff2d766fe4e5f1eb1c7c181

    SHA1

    e258817b906db77c97fcfe820affd05ca6d5a964

    SHA256

    10d773161882420c010a03d4595700f37b3ff64d01239b2c73b0b81ab98b8405

    SHA512

    fc3e377794940185bfefcbaa8468f110104bf51b19c71c16e4483265232df5f2502f49fc213f8870e3419b8abae5684d74855d7b822d12cfa6b4576d91ce4dba

  • memory/804-0-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/804-37-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/3880-33-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/3880-38-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB