Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 20:09

General

  • Target

    3086ca20eea507ac1eaf5a929c3538005f640808703da3aae230ef0c69a50a87.exe

  • Size

    248KB

  • MD5

    4bedb667a4271fa0f435c774fe4799c2

  • SHA1

    b63c4b65aabc86e5752d58c4a8208953d97190e1

  • SHA256

    3086ca20eea507ac1eaf5a929c3538005f640808703da3aae230ef0c69a50a87

  • SHA512

    4aaf32b178b2956e8e8e19b9aab9c2c958ff051108d93c712adca4ca267295a1c410293591edab4a222b34188d356ad2bed2eb1ecb5661f9930f46c70c681b47

  • SSDEEP

    3072:rNV217h3TaGUe1AK8b/EQk28wlowM6bz1gNNdrHd1fdVcjsQyO1obMwmeBnZ4D:5mr1U/EQk28wloIbIVysQsRme1Zk

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3086ca20eea507ac1eaf5a929c3538005f640808703da3aae230ef0c69a50a87.exe
    "C:\Users\Admin\AppData\Local\Temp\3086ca20eea507ac1eaf5a929c3538005f640808703da3aae230ef0c69a50a87.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\couumo.exe
      "C:\Users\Admin\couumo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3200

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\couumo.exe

          Filesize

          248KB

          MD5

          e329c32cffa20e120a866407acbdd562

          SHA1

          c02382193a53aae2eb55b5b69bce5ab2181c15b5

          SHA256

          1cc6cdedd3fc83889be520c9db92faf1e97470ea329b4bfe34eecb2166639288

          SHA512

          5f6c5389916e83f50ac733ae7fe2e9c0defdee663ec892828c9e306af2f96a046e055869d5ff44fb492f1fc6cafe43e116a31bb285dcacfd401336027530ee38