Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe
Resource
win10v2004-20240508-en
General
-
Target
4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe
-
Size
77KB
-
MD5
68365e7007c9c209acb9bc081277b9b6
-
SHA1
24da4f0a0ec75a97bc49362bea0f6afb4fd41e73
-
SHA256
4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452
-
SHA512
f118bea5c68f6d1bca9a243f4293ffc9366f17c656a8f9b00ab9da166b2afe40ff0aa188e7f6b467d149b41915fda8736e35c3f27d9f5a3de78a163921adc6a8
-
SSDEEP
1536:0ly18PCk15Bx8pEttgdO/mXpgWXOJgQmmogDcMH5fCVsJVafuegWXAi+oX9tWV0x:oy18PCk15Bx8pEttgdO/mXpgWXOJgQmP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
doajuuh.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" doajuuh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe -
Executes dropped EXE 1 IoCs
Processes:
doajuuh.exepid process 4940 doajuuh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
doajuuh.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\doajuuh = "C:\\Users\\Admin\\doajuuh.exe" doajuuh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
doajuuh.exepid process 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe 4940 doajuuh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exedoajuuh.exepid process 4564 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe 4940 doajuuh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exedoajuuh.exedescription pid process target process PID 4564 wrote to memory of 4940 4564 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe doajuuh.exe PID 4564 wrote to memory of 4940 4564 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe doajuuh.exe PID 4564 wrote to memory of 4940 4564 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe doajuuh.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe PID 4940 wrote to memory of 4564 4940 doajuuh.exe 4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe"C:\Users\Admin\AppData\Local\Temp\4fbef20953650aa41db82064c1c97ad197840d53ceeea5ddf76c890122d89452.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\doajuuh.exe"C:\Users\Admin\doajuuh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD59d3129372eb756bca4bdc8b139838527
SHA14c7d398ab4c7414fb454075fcb3618f35115ceff
SHA2569ee6e913cabd0ecdd07cec4ee8cf415f7eb4cfb7a091268e05d4bf61f972e863
SHA5124fcefbd7767653d6a585f8d62f479fb023c8f3010500abdce5f028c2ed984f1d2dbb315bfb4e7e2eabdeb0a222c136cfc083fd50fb5b501a42257ee960e87d80