Analysis

  • max time kernel
    157s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 20:58

General

  • Target

    c6d7f5930a349825f232c0e7181c95c5.exe

  • Size

    256KB

  • MD5

    c6d7f5930a349825f232c0e7181c95c5

  • SHA1

    dfa6006de65d5ace389315ea240cd948e793ba24

  • SHA256

    e0559110a76f0fd2a83ea961257cb625ce900c31f28dd693512055878831e066

  • SHA512

    65dce2315086b926469360e6fc4787c7cd17f1c7bc17374ee2c10b300cea2dbcb7bd3f72ccbf15657c84783b8821f7a742626d2bd9e0a68971374fb415b50ac8

  • SSDEEP

    3072:Jco01tQiFd5B2iAhSQ7QkRlye1k2kE00o3yCeJbnpH0w922UP87coVEUHG5HzCoe:J10jQu9Cb7QkRli2D9UyEUmNzTi7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6d7f5930a349825f232c0e7181c95c5.exe
    "C:\Users\Admin\AppData\Local\Temp\c6d7f5930a349825f232c0e7181c95c5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Users\Admin\yueehoy.exe
      "C:\Users\Admin\yueehoy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1592
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:224

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\yueehoy.exe

      Filesize

      256KB

      MD5

      298c7690bc45b9913415fb619ee99e32

      SHA1

      72897133770fd2e52eeb0e47f49d841b79cba97a

      SHA256

      eab9fa399c5abec405e74070a20b8b64fdda5534ac994b5b21d17260269b29d0

      SHA512

      7e835388c13ee07885362d09efa619e1dd4011f10c942d26ae902ff6688ea7e96cbefbb1072aad2fdf902141d6cb798c9e9aba43c3eee703613e457857657aed