Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/06/2024, 01:20

General

  • Target

    0ac0f90d187610d1801bcebba6dfa1d7.exe

  • Size

    100KB

  • MD5

    0ac0f90d187610d1801bcebba6dfa1d7

  • SHA1

    3916fcc852475dfcbd9969abd019236c72c1ef9b

  • SHA256

    005cc69e16a0a410854859aa50c4bf15f6049ec89e5713f4db0b965d98dc2e39

  • SHA512

    c7c2b12bbd3d98b92f5fa0b5e8c12692671835de563df12ba30f1b4954855aec0af07b448cae157a39151f4a25a1b23f4945c7ad539eb0afe74e49cdf0f1880c

  • SSDEEP

    1536:8ytGZ82NTzwqq1MGAc4ohrPXo+73Rez8b0SywNIjni:+wqdurPX7CwCni

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ac0f90d187610d1801bcebba6dfa1d7.exe
    "C:\Users\Admin\AppData\Local\Temp\0ac0f90d187610d1801bcebba6dfa1d7.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3848
    • C:\Users\Admin\xqsij.exe
      "C:\Users\Admin\xqsij.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xqsij.exe

    Filesize

    100KB

    MD5

    cd068145e931e9730b744cfc2e6a1873

    SHA1

    37a13e5e40448ffd4a37f6ad936aa5f1a3c18ddd

    SHA256

    0a7c0a9b0cbbb4600735989d9f04819520b0d243461c1ce678d69a733192d019

    SHA512

    42006320702d34ede79953a4ac30263987470de80c8abf034008825c670e52407a77754ec18d91d4d60a7c7e13f3ef562a1fa955ef8c3eb7f88440044cac70a0