Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 18:59

General

  • Target

    140ecf4ec0e47bb5ab9f2712780ce22d238386101203aafeab9a105ae61d900c.exe

  • Size

    88KB

  • MD5

    681f9b497a0197f61306fc775088f35d

  • SHA1

    7ec231726737335b18b69f3afa0518cc1905eba6

  • SHA256

    140ecf4ec0e47bb5ab9f2712780ce22d238386101203aafeab9a105ae61d900c

  • SHA512

    7efdc71eeceac5a05b509fb981e7a07777721d3d26f6c433d9939af1593eabfcd2e6632a4d24522d0f359a6c3bc4eb551268a16e1e25eecc8c835591a20a3ee2

  • SSDEEP

    768:HO6jxOJETcNnIHpFeh6RM1rA8dOsk7jbqqRkA5okK1DfsvtDzsXjLft+9o1Jz:HOcx/ANILFUnzJA5o9BfItDoXjLl0+z

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\140ecf4ec0e47bb5ab9f2712780ce22d238386101203aafeab9a105ae61d900c.exe
    "C:\Users\Admin\AppData\Local\Temp\140ecf4ec0e47bb5ab9f2712780ce22d238386101203aafeab9a105ae61d900c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\ceefu.exe
      "C:\Users\Admin\ceefu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3544

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\ceefu.exe

          Filesize

          88KB

          MD5

          eb1f989d6890494207ce40f23edd3739

          SHA1

          64e9cbdeef017afe04f7e10f3442644bb5c16d06

          SHA256

          187b2fd1248a645fc46eeb13cc619643a7e96f047381ed27a6baf68c060c817a

          SHA512

          b9882819754948542c863b5b94436c1783273e4e08556b0a8a92d6425164ef0b563e9c43dcb0c175392d11615f7047b92e7b65a6dc4010ab74ab7cc5192ebe4e