Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 04:09

General

  • Target

    dc407a7548630c13113d468564f7f7a2bf19cd2c83ff58552f3b4778f4bfdc59.exe

  • Size

    156KB

  • MD5

    cf1e22d4b427f32f2e0812aa3e8bb25a

  • SHA1

    6277f06792358cc6f0c9c0a34d7dd91481ad2d8a

  • SHA256

    dc407a7548630c13113d468564f7f7a2bf19cd2c83ff58552f3b4778f4bfdc59

  • SHA512

    8f139da7f5d79149551347d53cdce13c0ac3b0acd6071ccd4075aaab47318f38ea3ad42137baf7cc1a6c281638716890cddc7c088f10e4e2f285a5005864c683

  • SSDEEP

    3072:A0O2q9j5h3QKWXXWXG8FF7K+AmsgE5kEZZZy6x84JE5j4oQ:C9jX3QKKXWFFF7KlgaSPd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc407a7548630c13113d468564f7f7a2bf19cd2c83ff58552f3b4778f4bfdc59.exe
    "C:\Users\Admin\AppData\Local\Temp\dc407a7548630c13113d468564f7f7a2bf19cd2c83ff58552f3b4778f4bfdc59.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\lieosu.exe
      "C:\Users\Admin\lieosu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lieosu.exe

    Filesize

    156KB

    MD5

    18b7de963378fe4e7963736afc67ef34

    SHA1

    864d2943ff08b6de07dd228121ac29be8691b16c

    SHA256

    40a4b39630fd4729bae69b6c1c184533bb91f146899e653d02cb639e5cee36e1

    SHA512

    7f6e7fc08184a061a53d867739684760f30d47f637cb407a884f156dbb626f4e93e20a0a7d91c687eae59a6f2c5d69397f06673eb956e959a5de2aba3fb1f036