Resubmissions

28/03/2024, 19:58

240328-yp6h2afh52 10

26/03/2024, 19:31

240326-x8k6rsac82 10

26/03/2024, 19:29

240326-x7nv9sdb8v 3

26/03/2024, 19:26

240326-x5nsgsab94 10

Analysis

  • max time kernel
    66s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 19:26

General

  • Target

    40a30e39dfce70f5bba7b73dfe0bb97aa6a01b61ba9a3b20913159e077d5e465.exe

  • Size

    172KB

  • MD5

    d5d67479100e986a12e93f9be917bd9c

  • SHA1

    33fad2e93fffeee3c2b358e57d44b632cbfc8e20

  • SHA256

    40a30e39dfce70f5bba7b73dfe0bb97aa6a01b61ba9a3b20913159e077d5e465

  • SHA512

    aaebd28f8c8222ebe8b9080135fa1ee33729abc2787ea5d80cd877e0b8a7f0c1da60469658d8492a0a2567ffed3f15ae94969c91942554488f58d5ef35f88853

  • SSDEEP

    3072:jbx0J+a0UAVTj2XAwqr6HFjuoF+N7bZD16iYIQusGGTkLGFMMalHSXvhSkXWnU2X:jbNa0U+j2Qh69uoF+N7bZD16iYIQusGN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40a30e39dfce70f5bba7b73dfe0bb97aa6a01b61ba9a3b20913159e077d5e465.exe
    "C:\Users\Admin\AppData\Local\Temp\40a30e39dfce70f5bba7b73dfe0bb97aa6a01b61ba9a3b20913159e077d5e465.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\yoeac.exe
      "C:\Users\Admin\yoeac.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1060
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1432 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\yoeac.exe

      Filesize

      172KB

      MD5

      27564001e126cd221e0fc419c4f4fe35

      SHA1

      a4651c64386fe9f351fe24a48c540055b00801ca

      SHA256

      0713bd729e4ced752df4eec977ed9952d6c6eea00c8d5374dc17bb2a3121b6fe

      SHA512

      9036693ef4f49a74e8124cfc06504225853cd837ca158ce6af58d65b3ba98d885f89ea2d28151faf5b32c43f495c669d42b6fdd4cd6e0a7bf48adf9309a428e3