Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 20:47

General

  • Target

    3bb3fc6612d6cb99358274e708e70475b1ce4b6ccc7cdd469804dcd5331c9017.exe

  • Size

    216KB

  • MD5

    427ae9919bc22f07e9b106eb288c3478

  • SHA1

    a742980d11f095f3982965107cd121f2b59f6e98

  • SHA256

    3bb3fc6612d6cb99358274e708e70475b1ce4b6ccc7cdd469804dcd5331c9017

  • SHA512

    09cae5442955f1dbed10563f366f24ccda638b2fce1f19df0cd639f12b925fd812ff71e33f76bc1fdeedbab519f9523d17cecc96a65df4e5955fb25c952b4c1c

  • SSDEEP

    6144:H2ZIfrt3+TetonBi3QxRy4g09ICSnqf9uSUgkxtpsaPjK/bEoK828fwAoEn+MR:H2art3+TetonBi3QxRwfnqf9uSUgkxt0

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bb3fc6612d6cb99358274e708e70475b1ce4b6ccc7cdd469804dcd5331c9017.exe
    "C:\Users\Admin\AppData\Local\Temp\3bb3fc6612d6cb99358274e708e70475b1ce4b6ccc7cdd469804dcd5331c9017.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\siidai.exe
      "C:\Users\Admin\siidai.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2716
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\siidai.exe

      Filesize

      216KB

      MD5

      fa9f1ed1b6cf2a1a32300937e9a6e44f

      SHA1

      fb86b1779f5e6144d166b6fe0b74ff5020bc518e

      SHA256

      f0e0b567e5eefa5569f100cdd220b19ad0d4b656be897fd79ae710c509b62518

      SHA512

      4e6f709804859cc9a69ce662b603dbfde3692d334faa6f1952e84de300f2a91d2be332f724a9ddf86540cb8414cfa3396231eb73f8157a52d16c08b0a79141c5