Analysis

  • max time kernel
    162s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 17:57

General

  • Target

    1e02516503cf48a9754989b76eb4efbc8acea74fbe284e83477509651a8b6efc.exe

  • Size

    384KB

  • MD5

    fd63ba02d77f3d09697a45fa6849fae2

  • SHA1

    f62a0be0aa9978a15dcc4b054e9eb546286ba359

  • SHA256

    1e02516503cf48a9754989b76eb4efbc8acea74fbe284e83477509651a8b6efc

  • SHA512

    6baf5cf4f5dfcf3e02246e1270fd3a50dab54cf33836a69f1bd2b7a071f098f39f0c5c7f9b49860906b36b3e404f57f6d0bfd1d7ef9b1f50b16bb6c427831713

  • SSDEEP

    6144:0stj9I4rG6ua4a2TURdKDZ23w8QEoKHjWZLKBPvHIWM5i:inaUZ2A81vWpaPvsi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e02516503cf48a9754989b76eb4efbc8acea74fbe284e83477509651a8b6efc.exe
    "C:\Users\Admin\AppData\Local\Temp\1e02516503cf48a9754989b76eb4efbc8acea74fbe284e83477509651a8b6efc.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Users\Admin\gqrout.exe
      "C:\Users\Admin\gqrout.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4436
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1704

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\gqrout.exe

            Filesize

            384KB

            MD5

            3825d8aa31a4fddea68d6907c18d1121

            SHA1

            4d0521736327496d2e9048c91d070cf443689981

            SHA256

            ea0be1a0761d971b5c99d999dc1aee50c7e92c7d94bd6b96839714c22f526436

            SHA512

            f2efdbdf3d57a89866c95d60368bf1a116ddd1f6d039f9e000aa683e8213cbb02f24c195e41a238b3b5ea27282a46fb5cf72248377a241989da7267c42deef7a