Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430.exe
Resource
win10v2004-20240226-en
General
-
Target
b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430.exe
-
Size
53KB
-
MD5
998be66f56f9e598cf872629927ee026
-
SHA1
f5e3d7f961db9ea296e274ebedc21277262423c1
-
SHA256
b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430
-
SHA512
024d386121292a4cd9e406d87f52695aa282b28725cf234d9a00e415ab55b9aa080dbd00fad718ed3ff0c3f889e6a770a21229c10f8b213ad17c5fe6a4dfdfb8
-
SSDEEP
1536:vN8g8r8QNEHxl2N7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:OEHxl2NJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" huiopum.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430.exe -
Executes dropped EXE 1 IoCs
pid Process 3876 huiopum.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huiopum = "C:\\Users\\Admin\\huiopum.exe" huiopum.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe 3876 huiopum.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1604 b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430.exe 3876 huiopum.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1604 wrote to memory of 3876 1604 b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430.exe 91 PID 1604 wrote to memory of 3876 1604 b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430.exe 91 PID 1604 wrote to memory of 3876 1604 b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430.exe 91 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90 PID 3876 wrote to memory of 1604 3876 huiopum.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430.exe"C:\Users\Admin\AppData\Local\Temp\b7c57e0f512d3fe3f7416a8ffa3d54eb96ca5ddb9701dcabf527afd8bebcd430.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\huiopum.exe"C:\Users\Admin\huiopum.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD55e8936e93627044c1bd244694f00eef1
SHA1e4816e8492c1ebcb8508a299432e696933a0c7eb
SHA256788f9d70c0bca7f0e0b16540314736ce48f8e5993dc5c36d5be2192864d5bcee
SHA51205ce275f7846c5596ef7d0fc91067c628d803bedd1027b6ba1e1debefc5cfb304f413b69dc6831194d1ea7c6e4649d449f64acccece588777bb8c9cbddf20b2c