Analysis
-
max time kernel
46s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d.exe
Resource
win10v2004-20240226-en
General
-
Target
59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d.exe
-
Size
76KB
-
MD5
989a7b6175e717710d2e8aa33f2b9b90
-
SHA1
3b57648a115e4f01042d0aecede3a36f3dd3633a
-
SHA256
59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d
-
SHA512
17536269064f3e528135d587c90027bd5dcacb3b517cee55213125ff7b243ee9316d5a6f8246b20efbfb400375b5e5ab31e445e994ec9c0bdc9df2a5044a7c92
-
SSDEEP
768:6QIrC6LfowrtCWI+xOF4/i/BEYkp7P6lweQDhDmpU5GFrrEzWsdSE0d8pUHIkI09:6t5owrEUxO+2G40OIkarg
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mevoc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d.exe -
Executes dropped EXE 1 IoCs
pid Process 4608 mevoc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mevoc = "C:\\Users\\Admin\\mevoc.exe" mevoc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe 4608 mevoc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2260 59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d.exe 4608 mevoc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2260 wrote to memory of 4608 2260 59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d.exe 105 PID 2260 wrote to memory of 4608 2260 59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d.exe 105 PID 2260 wrote to memory of 4608 2260 59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d.exe"C:\Users\Admin\AppData\Local\Temp\59ded0794ea426b52f865296247e8da4194dd419951ed6c679b5caf85a3a438d.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\mevoc.exe"C:\Users\Admin\mevoc.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4144 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5be2c75ff5e1d055306bc452dd84f8500
SHA1b4d18f26498710c3601f76714972ed55023d126e
SHA25663629819ee79564278862cf093e7e7b42264bb1c10f5f8b47fb9dccdff9ffb85
SHA51218000c7302327cdd60f4c23b824a68f0a3a1c6b7aec15caf8c211a876132da2bef10dc3a2bd568762f456f23d459e400b467f1d1a4c5a45a2414bf0643ec781e