Analysis

  • max time kernel
    150s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2024, 13:57

General

  • Target

    de2c35223095306856442ebb7957a1ba.exe

  • Size

    172KB

  • MD5

    de2c35223095306856442ebb7957a1ba

  • SHA1

    92d0e743bbdc9fe8250c73fe1e55667c5d5c894b

  • SHA256

    b0e8425423458fad530b24589ea58c0fc9458d690cd235502e5aa16c4c76a670

  • SHA512

    0756bea5bceed98264b6d9455ac90ac59d8d0b821345c61e491d66c56800b765cec8b038150ce4b713aa3e25ce877974cd7a2f23cfe955f72473645345247b27

  • SSDEEP

    3072:eTVlB5QqiwcCA0laletdpVinzswyAQjh/gSF3Ef3ykQoz7WC4:qIqtc30l+2yzswyAQjh/gSF3Ef3ykQog

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de2c35223095306856442ebb7957a1ba.exe
    "C:\Users\Admin\AppData\Local\Temp\de2c35223095306856442ebb7957a1ba.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4516
    • C:\Users\Admin\taitod.exe
      "C:\Users\Admin\taitod.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\taitod.exe

    Filesize

    172KB

    MD5

    c156495a12ed0c701003ade92870d077

    SHA1

    34ffd3d48ca8400f57accb6d2a5b1c38a639e51a

    SHA256

    c3e0c3aacc45345cf0b8edbf162d6b6a507d1cad68bba14361e3fefc8a209337

    SHA512

    e11853906f46f9fc8d17f4b685db807a977e80f139e8a974f5b8f685b2acb242a72fc5fa350fb32f068d77b76543d0bfe320df247df7cccba6f0fbacff27eb30