Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 04:16

General

  • Target

    ddf521f481f58ad13f049d1d56a6c6790dcad66ebef0543eac70ebc51166d991.exe

  • Size

    96KB

  • MD5

    36412e480cfee73b256af719faccfa93

  • SHA1

    c6c44ae4599b6ff8522223c8225235ac0fd3c574

  • SHA256

    ddf521f481f58ad13f049d1d56a6c6790dcad66ebef0543eac70ebc51166d991

  • SHA512

    b4f738e65940a10a233acfaf11a90c9efd8f3c771ec0b01861246dda7d85d611800e543a7b7fb3f236c1020ef959cdd136069cd7590fb4b9fa42e32b6a18bce0

  • SSDEEP

    1536:QSBH+gzWwmhLmncdkadGVScGYJXeiyCnO+TI4K4I4i404R4Z1VcvsJOpPpMm4/Ny:DHfW6cOadGRJuH7ut/Tdvd+hXV/vU3vV

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddf521f481f58ad13f049d1d56a6c6790dcad66ebef0543eac70ebc51166d991.exe
    "C:\Users\Admin\AppData\Local\Temp\ddf521f481f58ad13f049d1d56a6c6790dcad66ebef0543eac70ebc51166d991.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Users\Admin\feamao.exe
      "C:\Users\Admin\feamao.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3116

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\feamao.exe
    Filesize

    96KB

    MD5

    5c3f917e28a2d7bfb95c60dd3796789b

    SHA1

    39ff91d988f28c0cb1ea042b36eb6c8f0ca75421

    SHA256

    a8fbf86d33acb67c98e57bc52c76093d93c20e9babc2fa3a927589ab5996386f

    SHA512

    216892ba68f84e7b3d2fbb763d3e85156d65b3032f4d90c8e7a92020aa892436f6a0ba4c5e688625650ddbb920a42bd38a42666c93c153b6a152526352c70e0d