Analysis

  • max time kernel
    150s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 20:34

General

  • Target

    35d40cd5729bb99358a92c6d3f3c11c99b652b9320e674766db282eac9fd2e31.exe

  • Size

    53KB

  • MD5

    bec880391cdc3cd24a8114303d90227a

  • SHA1

    190dee6e3fa40d0caf193f15a4764454700af98e

  • SHA256

    35d40cd5729bb99358a92c6d3f3c11c99b652b9320e674766db282eac9fd2e31

  • SHA512

    5dbae3d2f2575d1f3d9443a13c9ab79069f1242ba2284d2ab0bbdc2dc5570313bc05dfb68e6b741e7f040043996654ba486442895894f76e1f9e37342d4cb9c0

  • SSDEEP

    1536:vNeg8r8QZF+h/7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:UF+h/JJjmLM3zRJWZsXy4J9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35d40cd5729bb99358a92c6d3f3c11c99b652b9320e674766db282eac9fd2e31.exe
    "C:\Users\Admin\AppData\Local\Temp\35d40cd5729bb99358a92c6d3f3c11c99b652b9320e674766db282eac9fd2e31.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Users\Admin\jiuopu.exe
      "C:\Users\Admin\jiuopu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jiuopu.exe

    Filesize

    53KB

    MD5

    f38d5a5562d56695e50c30bf71901fef

    SHA1

    de1fe13afe5fc0d78c9b727c3aebacd8b61111ae

    SHA256

    4a2383a05a419c91699a86eece1c9905ccc5d486f9ac7690f2be881afe841070

    SHA512

    e7077e68f8cc136313467ab1a30e67743ef3498293fa6d51822bbf84d4bc53b8fdac26803f24e9e9814f78d097e250dedbefb7e84758ce91cd549f68b08d3893

  • memory/3912-34-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/5012-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB