Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 12:47

General

  • Target

    dc7d5c08e85dd0c4d3d7e9000b6f3560N.exe

  • Size

    140KB

  • MD5

    dc7d5c08e85dd0c4d3d7e9000b6f3560

  • SHA1

    6e35f30a7842e7d1739cfcf4385c01663b194be2

  • SHA256

    f034bf54e103f81d569df8a0f23b97d50992f4faea996ad827986bba3494a492

  • SHA512

    860b706cefbd3d700da380744b72bb0c30c1add49895ffde16553ba5ae91ab8604857453fdf142e76fe4eb551d73b98400fc315bfdc425f5d84a4fa2c8367e80

  • SSDEEP

    768:zB+A7hhyt4pd04q0zik+vhy7g0EM/LinbQO5cn9:tbhheEn3+pCg0EUGQO2

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc7d5c08e85dd0c4d3d7e9000b6f3560N.exe
    "C:\Users\Admin\AppData\Local\Temp\dc7d5c08e85dd0c4d3d7e9000b6f3560N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Users\Admin\puaxe.exe
      "C:\Users\Admin\puaxe.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\puaxe.exe

    Filesize

    140KB

    MD5

    c343f04b21be8c4958686d2a3e305c95

    SHA1

    2bd8a65a1d0b46c1afd34f0ac0a5c932bef7937a

    SHA256

    1ba3edfcff8150811c31a7883fe61f2a23d8be8ca738ed16842a7670d080b923

    SHA512

    65975eff740364a7ffcb41f47eb41dd1bd79fee37d497d2e7cce2df259f0b473a986f2921d83b9462d3c902c8709d4b3b8669b83fc3aea6d3133602e9b0f474a