Analysis

  • max time kernel
    150s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 07:53

General

  • Target

    d74b8fdc88f261b5b443f5a2b63d0d1624c8bf83506345cae25b019d0cc3e8aa.exe

  • Size

    160KB

  • MD5

    aeee0460fd535174a50ea9b452bfd360

  • SHA1

    0c42ae608ba41f455980bae720791caf5f5c4a14

  • SHA256

    d74b8fdc88f261b5b443f5a2b63d0d1624c8bf83506345cae25b019d0cc3e8aa

  • SHA512

    49c677bcf785859f0ebe8b2bb526b0ef9e607bc93318a96a387b43f9fbaf7b568f86932c59e438dd7d4872a1dd1ce92fc954b7d924ee5d2748ce00153e99d27a

  • SSDEEP

    1536:YPWivSI3wcUS8oAeiCX6tEG7a9GjB4tnYmy1DZeK7U:oS3S5qCXKgGjYnBy1nU

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d74b8fdc88f261b5b443f5a2b63d0d1624c8bf83506345cae25b019d0cc3e8aa.exe
    "C:\Users\Admin\AppData\Local\Temp\d74b8fdc88f261b5b443f5a2b63d0d1624c8bf83506345cae25b019d0cc3e8aa.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5976
    • C:\Users\Admin\huivoiq.exe
      "C:\Users\Admin\huivoiq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5668

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\huivoiq.exe

          Filesize

          160KB

          MD5

          84fe22dbca6aef0075ed85cea2bd7317

          SHA1

          a76b7fe4dcfff0b125b97c7c90109d4db150eabb

          SHA256

          c73ac06a27e1ec31ef59672d3fb7c1c116ab6c4e0837bfe31e1b8a6528971471

          SHA512

          daa536087e306c194059fa2ca3680492e44f467c708a25a17a49c7e974c1fc231c5ca3b7a01f64194ccc64eaf9e888cc167c62d52efc166a1cca61d27bf617d2