Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 19:17

General

  • Target

    1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe

  • Size

    56KB

  • MD5

    917c6cc6e5b048e49a7643420e159f00

  • SHA1

    29443ce4b55d294023a2282df82508f86dee117d

  • SHA256

    1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed

  • SHA512

    b0d95a1c9b74f25f3a285ec04d4853277f889cbd997a2e7a87e0a9fd52160994c90845e4a94214d2a865c1ca79fee23b7e4cdb6653c54383373f26083ad17947

  • SSDEEP

    1536:SqkcMAQgnRt9UdLw6BNMyBhXZxHJ6P6D5B0qEy:Mgz07JjD5B7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe
    "C:\Users\Admin\AppData\Local\Temp\1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\muguy.exe
      "C:\Users\Admin\muguy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3548

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\muguy.exe

          Filesize

          56KB

          MD5

          e4c5d85fc98ff04fa452889c9e23c03a

          SHA1

          bf6e885a56551de1280f58afef1df05cfa2e15bd

          SHA256

          d35f50c279970e29d60813ce7cd39cfb6cad77d1636225eef3e919b4a79272ee

          SHA512

          1d097c32f40e31f3fb23c3372e607a0ef3e3e59761c5e73e2b456b75f5f2d93856fede88d08c25a40f5ee66d0b697a7103f24e58855f08d28654f8327552096e