Analysis

  • max time kernel
    154s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 19:48

General

  • Target

    719ec91955451b6b54ee581adabc5ebd.exe

  • Size

    200KB

  • MD5

    719ec91955451b6b54ee581adabc5ebd

  • SHA1

    8aa7ea15bd142a0d394441465ac5affdf84b3718

  • SHA256

    a779cbe76bdde73fad1cf06060011ea2de4518dc1df69e025930c8063d7c86d0

  • SHA512

    a0a0c720e921d19feb2372f9413bb2614c94e57e0a263306664a48684181a9e036178e620ebaca56a7e580e9a3dc9dff4e46a027767516b25b1b1d2d4a46d9f9

  • SSDEEP

    3072:U1w/Jeo3y4CpCfCGCCOCwC9CvCFCfCLCvCUCLC2FInROUSRSGSuSQSmSNS4SQSsW:H/go3yGFInRO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 20 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\719ec91955451b6b54ee581adabc5ebd.exe
    "C:\Users\Admin\AppData\Local\Temp\719ec91955451b6b54ee581adabc5ebd.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Users\Admin\guawe.exe
      "C:\Users\Admin\guawe.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:860
      • C:\Users\Admin\vrpos.exe
        "C:\Users\Admin\vrpos.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4648
        • C:\Users\Admin\feuur.exe
          "C:\Users\Admin\feuur.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4936
          • C:\Users\Admin\daeevuj.exe
            "C:\Users\Admin\daeevuj.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3184
            • C:\Users\Admin\guawen.exe
              "C:\Users\Admin\guawen.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1348
              • C:\Users\Admin\peori.exe
                "C:\Users\Admin\peori.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4244
                • C:\Users\Admin\caoovi.exe
                  "C:\Users\Admin\caoovi.exe"
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2168
                  • C:\Users\Admin\piuvab.exe
                    "C:\Users\Admin\piuvab.exe"
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:3728
                    • C:\Users\Admin\saoohut.exe
                      "C:\Users\Admin\saoohut.exe"
                      10⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2208
                      • C:\Users\Admin\maoruw.exe
                        "C:\Users\Admin\maoruw.exe"
                        11⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:1492
                        • C:\Users\Admin\geabo.exe
                          "C:\Users\Admin\geabo.exe"
                          12⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:1412
                          • C:\Users\Admin\yhqom.exe
                            "C:\Users\Admin\yhqom.exe"
                            13⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:3396
                            • C:\Users\Admin\koejuuh.exe
                              "C:\Users\Admin\koejuuh.exe"
                              14⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:4968
                              • C:\Users\Admin\cgqos.exe
                                "C:\Users\Admin\cgqos.exe"
                                15⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:4692
                                • C:\Users\Admin\wuqil.exe
                                  "C:\Users\Admin\wuqil.exe"
                                  16⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:3192
                                  • C:\Users\Admin\jauug.exe
                                    "C:\Users\Admin\jauug.exe"
                                    17⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:4028
                                    • C:\Users\Admin\bauufe.exe
                                      "C:\Users\Admin\bauufe.exe"
                                      18⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:4400
                                      • C:\Users\Admin\wcriel.exe
                                        "C:\Users\Admin\wcriel.exe"
                                        19⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:3596
                                        • C:\Users\Admin\flwiy.exe
                                          "C:\Users\Admin\flwiy.exe"
                                          20⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of SetWindowsHookEx
                                          • Suspicious use of WriteProcessMemory
                                          PID:3504
                                          • C:\Users\Admin\koejuuh.exe
                                            "C:\Users\Admin\koejuuh.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of SetWindowsHookEx
                                            PID:3608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\bauufe.exe

    Filesize

    200KB

    MD5

    3ef74dd7d058bd2ac13e4fe38930d717

    SHA1

    22b0403c8656e5302b1502183ba200a564238c79

    SHA256

    a1ed547e0575d1afd76af99333c6316de416af9fa444400859f5556f143665ef

    SHA512

    0aab4906c60cc2340896384fa021c01dc3b2c9a2f611ce6dcf24c6acd49007ff657c461d5836a0b7914e032375f25f2ad40cb279cd55ecfb9e806f20a6945db1

  • C:\Users\Admin\caoovi.exe

    Filesize

    200KB

    MD5

    eedd48fb3bb0e02a73601f797786401e

    SHA1

    df8d55b84952645edbd83438a1bd1b5a6984d7a3

    SHA256

    bea5c97d7bc2e8c91cd92a2906d163975118eccb613632de7b677344f5ad6c99

    SHA512

    bb5bb2135fe4d7569c56a0ea90427f749b1ad69d0bb071c34af42dbe0419f13f6e2acdeaf0bde9898655d24e59101033e5d88939f149e9cb8d6c0bf43401b33d

  • C:\Users\Admin\cgqos.exe

    Filesize

    200KB

    MD5

    c9b7045e4fa81aee11dd9ee1952e562e

    SHA1

    c52774df5e9db93be0e357674a4693a5ee9493bc

    SHA256

    848df048dd7d3c45030178c5a35cd77c2a861291a864cc8a2b2b7bf7b826e4a8

    SHA512

    bc3f3b7dbee434d3393f318570d999920bbb9721fcdb582b10888a4958a8097318f86668a7cf0d2601b430e92fd99639cdce8ce0ea9caab7381d6c405ba336b4

  • C:\Users\Admin\daeevuj.exe

    Filesize

    200KB

    MD5

    a278a06d992418f054e59f446c1f28f7

    SHA1

    5225db4580af5ca534cf45b00cbff8f84cb29638

    SHA256

    2d06308bff6ba44742171c2e5d761faf8880029587cde3fd6cb07b72d801342d

    SHA512

    9be54a5e62479acd9316f47035c83ed8dea096b57810edb10e518b7cce8426fbcd083ee439f4ae3f76c4f25480f010fe879d9752fe55c9e831e4fee620310cc7

  • C:\Users\Admin\feuur.exe

    Filesize

    200KB

    MD5

    3b0d0ca9f68d6091a85909f8b1619af2

    SHA1

    38eb8f4b26ec7f194cd9ed68f7d77fbca954e77a

    SHA256

    270810af56fe8aa2042a9998580d742c34fecfe652715c661da7f18f1c563307

    SHA512

    23ee2f1c907ed43751cb6490c8da1d25be9098d0f91fbf83422e3c9dcaa2382f36543191546915bb3618d427ba6769c98b4d6ee7915ff1b850dd23a1bce9ee82

  • C:\Users\Admin\flwiy.exe

    Filesize

    200KB

    MD5

    cec41e473dfac14071f2bf4bbfa39754

    SHA1

    4d8cf6ac232dc87428bb7e6f7782742bab93bbd5

    SHA256

    11359a2ea086b7b6bbec890bb0ef940e9f505beafd6a24e8e413d865c46df1d0

    SHA512

    d9e93f233ecfc63d02884d470ea5500a7dfe0b9f707562ee9992b6443d99c2ee839ce33c957fafafbee83dba3dfb7b22a67f4508b99371f7fb4347c0c86def0b

  • C:\Users\Admin\geabo.exe

    Filesize

    200KB

    MD5

    ad84c73b0f58f1e5863f2d575a3ad144

    SHA1

    517c6730b2b7eeee81be30afe96824e7933986e1

    SHA256

    9a9b141781c1a7a2ddae51e2598a4aa6b44a6d529ee515dff519f5e929b69d8e

    SHA512

    efad1a94ead07d052321a03978218bc30d4b6d0e9bfb4de08abd45ffca3255e0dde46d9671cfbc82795a764df10035ad3432c20855498972cad130e5cb3fc721

  • C:\Users\Admin\guawe.exe

    Filesize

    200KB

    MD5

    5dc9c9f65e5b11a4edd40d19662d9a60

    SHA1

    c8fdf2cb67ccc3c4a7817e1402242622b3a9d228

    SHA256

    569ee193ae7cce95dfdb825e92a2b020353cefff464287c93968094727ce1ef2

    SHA512

    612b72864dfb2a502373c64703edf33bab9f5fb960e0e6b9b942295137a1bc030da2f58374e89c9bf75da6b3c49db8462b48a78fd92e26344c6a8ca4b40b0cc6

  • C:\Users\Admin\guawen.exe

    Filesize

    200KB

    MD5

    c5f63f57a5e0f8f501e8a363bd1bb391

    SHA1

    6e704187da5cb3246f37a69c67a1b0390eff30f6

    SHA256

    9f22a889a52d68b98eda0375cd5034e75d53d99190a0135aa00f374af2d8254f

    SHA512

    ca54859b5a71a89aab2f49f83c8cfbf5bf9f2456760d3905704e0612fcbd3801bc0d37ab5e8c5b05ce604ec647dc9df3c200032b4e39393023d2f54d2e398278

  • C:\Users\Admin\jauug.exe

    Filesize

    200KB

    MD5

    7924ba3892e84ae71674342c767a37ab

    SHA1

    24756ce284bd979c1fbb5bf62c0c15f7b6a0d7df

    SHA256

    ee9c6e98a976bb853c621bc105bd6cf3d5eb446b7fddaaf6653314dfc432c29e

    SHA512

    74ad749027d0a2e5a8f48f0b069cfebf1df3a2e041767ab656e207340126c10a7b83247f970f6a477d53835850ba032f2b11d74333c579841c5f0564bf91195f

  • C:\Users\Admin\koejuuh.exe

    Filesize

    200KB

    MD5

    2e52cad99b0564779e00ee248684f772

    SHA1

    be1aa0e505a7a73d02413867414e88968b3c1154

    SHA256

    d3086fb4c19238ee30e99d17529e5409af0881e7d693674f6eeb9b9b04f6cf4b

    SHA512

    7dd7d560939a47d55fc91e49e3c41364903d61a07d2664f26970bb0b42bed4928ce1effc1405f37723cf2abb8a7a9fa48512c4aa439c1bc81af82b9b4c798b4e

  • C:\Users\Admin\maoruw.exe

    Filesize

    200KB

    MD5

    e476c9205337b0b9d16e3a9a58310795

    SHA1

    2294b084de07de9698d37584722c961ff465d9a0

    SHA256

    3a35f69e2a1ef65c6d9bee47cfb79d2f2b1d6f9b03dbce056d972e643001a10f

    SHA512

    2de933d54d990e7f0d69158a03aa9abb76eec50d9653f44dc875fb1bab73f0a21a9af2cef15d81947cae4e072ecd3c8e8a116246ee2dd0e1321099b0d6031d14

  • C:\Users\Admin\peori.exe

    Filesize

    200KB

    MD5

    efc63cd2f28174a21be7be7c3bac3c92

    SHA1

    043d1f6ef2e6ab6e8bda76b7dc0f73ca783a6431

    SHA256

    f5277c13756c9f748f9da8a5f965c7c6926cad5c68e7a049efe4c87d93816647

    SHA512

    d67c538581f970b73edb74aa12ca8d3a3c02a36bb5629341dab21ec761006fc20b9e38362d19fa7db30e8e7452ea4700703777ad04d555dc1c86d37f680db362

  • C:\Users\Admin\piuvab.exe

    Filesize

    200KB

    MD5

    714171091279331a9551f4e5872f4b3f

    SHA1

    0917b39c19ebd2d59c0124038259926b7bb81e3c

    SHA256

    0b8dd6e90ecffc7b66742a2b14a846b6214c25a2f09438ae2d560a50188d931a

    SHA512

    56deb0807ef9ace1e4bc81bd0f87b2da28b980bf52d66ed3c5d49afc44f1c03a693363475472c698328b2df1a6314e160b82ead1fdca623fbcac5baad03ab11b

  • C:\Users\Admin\saoohut.exe

    Filesize

    200KB

    MD5

    aa0191b982f3a0edda6923a1605edf53

    SHA1

    de04b31037ebcfb928180fb20e1f43589d9aac0c

    SHA256

    e99e28adc4922bcd74c917de6754fb3cf43d6b293c89d070dbb18fc586be05d4

    SHA512

    a34f43fe8b0e0dcd74cd8bb34219d0f0fa42bff2432dc317fedf226a8cab6f976571a3f77e1c3163d846c03f5552757496ef492104d0b04524282330db50ad65

  • C:\Users\Admin\vrpos.exe

    Filesize

    200KB

    MD5

    9ac9bd9b13051da04a941e3d89848c89

    SHA1

    409d974f691f658299543138933d071269810a06

    SHA256

    e6337284eac84e7fa5067addd4e1aaf06571347a19b249053bbf0cb9a21e77fc

    SHA512

    15430aebebadeb088917ebc6838e74b3cb4877ed6605848878fbd89a82c3e652245256f9a6434963881a8921479840ab7eea56a66e5bf1426d046de1714f00c0

  • C:\Users\Admin\wcriel.exe

    Filesize

    200KB

    MD5

    e1c641647ef3bedca77960d2514df16b

    SHA1

    76cea7aa1a4c36e9c0efba6fb8a00dbac4bba803

    SHA256

    0edf3094fef2cc60e4ca4d7e8cbf47f3ed4f6e8a1f8bddacf1c52c5b30217f6a

    SHA512

    7720ceb30d82f1ba9f550f1ec326d8cf96790e9ddcfc0cdfe48114cdccd87b7218e327b8ca377c498510b0973cfee066796a28fdc2c190b03663655a29ba9516

  • C:\Users\Admin\wuqil.exe

    Filesize

    200KB

    MD5

    bb9ffcfed5406922c4f008da867ce2d3

    SHA1

    ace09ea49e872ddfaf20f095640741d978892d55

    SHA256

    0a32bc6bf88fd23a5371eb6c69894b3d4647f2c265cc1061c638f90360a9c406

    SHA512

    332ee73137b954e657f5193db5488c2235623735f0fb49bd5da0990e8070f99612512ba70a573b5ae237840c53e0ec9fe402446237c4ae8de84eb3013c30381c

  • C:\Users\Admin\yhqom.exe

    Filesize

    200KB

    MD5

    98e1c8f6f902427bbfc7d3773dcadac4

    SHA1

    d65df79569be5d9e05229cbc81f9e5fbf82e9c64

    SHA256

    4edc79af99613a71a390cdf2bc93b13d0501539fced5dcf213dfc617bd086242

    SHA512

    2d022656ba7782dac1a783840ea0513be3fa0ec54ac19d5bd6cbadbb6e7686f5b801f1f6a6ebf4e339d85fa331f7be68de6645e8260aae4be7771fdb339cd1c0

  • memory/860-68-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/860-34-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1348-209-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1348-173-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1412-419-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1412-383-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1492-349-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1492-386-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2168-279-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2168-244-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2208-350-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2208-313-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3184-139-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3184-175-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3192-560-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3192-525-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3396-420-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3396-455-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3504-663-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3504-669-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3596-630-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3596-665-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3728-280-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3728-314-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4028-559-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4028-594-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4244-210-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4244-245-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4400-595-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4400-629-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4648-105-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4648-69-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4692-524-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4692-489-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4936-103-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4936-140-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4968-491-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4968-454-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4988-35-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4988-0-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB