Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 19:59

General

  • Target

    2ad66e864db3775b7b10f8309d2cc25663aade475bed44af56a747ce1ae37b42.exe

  • Size

    188KB

  • MD5

    5fb12b6d7121b9ec088cddf0f8be695b

  • SHA1

    673f0a140a0f34af077ecaeb55b8a18cad4e8b71

  • SHA256

    2ad66e864db3775b7b10f8309d2cc25663aade475bed44af56a747ce1ae37b42

  • SHA512

    05628da1d8c01e67e4f6aedbafe5575cd1fe39adfa1eac7b7efd8e9dd46533670098ba34ae609887984842173cc586fa327e34a07f7f2d0da0767b814d10a556

  • SSDEEP

    3072:K7fyQ+65ROnFX5pY0hrDGILpLI0M/Dk4KrfXRdjnbk9bOlezfQnFTTvprw1WdfW6:K76Q+1CKs0tzXRdjbk9bbyvprwwpW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ad66e864db3775b7b10f8309d2cc25663aade475bed44af56a747ce1ae37b42.exe
    "C:\Users\Admin\AppData\Local\Temp\2ad66e864db3775b7b10f8309d2cc25663aade475bed44af56a747ce1ae37b42.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\huowar.exe
      "C:\Users\Admin\huowar.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2908

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\huowar.exe

          Filesize

          188KB

          MD5

          1116bae47aeba99d156463be94ede344

          SHA1

          e64b8c06dea0b69624de9a8e4756da02dd5470bd

          SHA256

          c2b8628694a8049c8464e0cea16189c8e4796c3ea8e9ed7c789a42525c04b09b

          SHA512

          bd2b0037d02e1f4ad1acc2a4483ccbe1ace30f5866ab65af6a0714909c5e4948a39d590a6dff2a03e47a34fa17abaf16bfd14d1b495ea2cdbd7e8a03cd675096