Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 20:08

General

  • Target

    275858824cd80e8d3e7b35204eb63dee71cbc0cc9103d130c630373bbf332917.exe

  • Size

    156KB

  • MD5

    a7789f6ab2e04587ccc913b99c863c98

  • SHA1

    b0a6c6534b10361bdbe74a63fc366d9784661e4d

  • SHA256

    275858824cd80e8d3e7b35204eb63dee71cbc0cc9103d130c630373bbf332917

  • SHA512

    fd22b26f09a37f06a2da1c9f36ee4e2a7b24821c1499b30feb87c3f775f33f5a364808340e543b96aebec28c850133e6acbb62f882242fd2bf03f8e3dbaa38b4

  • SSDEEP

    3072:7ACcTATe0pBI1xkaGU0vBpT8k/QvbawuxtUYqBd5hAmamQAMHfhRvuWxx0h4oQZa:79c4e0pBI1xkaH0vBpT8kltDr8L5DMHU

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\275858824cd80e8d3e7b35204eb63dee71cbc0cc9103d130c630373bbf332917.exe
    "C:\Users\Admin\AppData\Local\Temp\275858824cd80e8d3e7b35204eb63dee71cbc0cc9103d130c630373bbf332917.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Users\Admin\piijuy.exe
      "C:\Users\Admin\piijuy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1436

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\piijuy.exe

          Filesize

          156KB

          MD5

          1753bac509937081d08fe2ff01a9c263

          SHA1

          31efe8dd0856b3b79a68e945b46c3051782c7ea3

          SHA256

          7a5fb5bc3d283360648d5086f00252eeb4cfa8e3bb8963781560232ab45632e3

          SHA512

          27c483e6d91f396006937734cfe74303fb8a0692e681e50c401417cdcf28dfe8c338ef5c3047a60cfd90d3b4a9ee2306398fdf18318a3ca097c9107f0db9c01f