Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 20:16

General

  • Target

    568819faab81a2fe93b7334a510b2af4e92bcbc508b023e663c0fc3eddcb69c4.exe

  • Size

    216KB

  • MD5

    3115f6112c4f835d82a3c843ec894746

  • SHA1

    f1eb8edbc1322529c6dc628b6075c020eca0d7cb

  • SHA256

    568819faab81a2fe93b7334a510b2af4e92bcbc508b023e663c0fc3eddcb69c4

  • SHA512

    53dc2526f02fb87440e666b1d9193639236ebe295499295815ad3bbf3c4f42bf4e6b296f6858d3b464d42a4288d5294ea834eeb1f8de8b6e9e58dfedcae9ec15

  • SSDEEP

    6144:tPhHct9RlyTcbMbgkGq/DrtRo/4COcOu2k5k6WRv7KXqyjEwGE46JxFqDs/e7wMe:FhHc7R/5pjEwGE46JxB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\568819faab81a2fe93b7334a510b2af4e92bcbc508b023e663c0fc3eddcb69c4.exe
    "C:\Users\Admin\AppData\Local\Temp\568819faab81a2fe93b7334a510b2af4e92bcbc508b023e663c0fc3eddcb69c4.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\heekip.exe
      "C:\Users\Admin\heekip.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3816
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4420 --field-trial-handle=2256,i,5035714022000286426,16259316383734940314,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3688

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\heekip.exe

            Filesize

            216KB

            MD5

            3876e1b923b576fb2e866270586964dc

            SHA1

            ca7a0bc571543ef50b365d6040e47651f0a29220

            SHA256

            a6becd9b05db79818b89d951d1b19117771ed44f32817da1c1034af8d02545ab

            SHA512

            7035243989b645309295da1d287a6e9773d0176edce57352197059b350af738c16d1ead303f536b02bd2be1403d461424f4b4d1da404198b01fe2dc464844299

          • memory/1100-2-0x0000000074A00000-0x0000000074A19000-memory.dmp

            Filesize

            100KB

          • memory/3816-62-0x00000000735F0000-0x0000000073609000-memory.dmp

            Filesize

            100KB