Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2024 08:54

General

  • Target

    ce0ce4022f474488bbbbb47ccdc934550792ad608e3dbee7282257511e8f9869.exe

  • Size

    216KB

  • MD5

    59c3cb9d6e6a1dbfab2b5a743aaa6ad9

  • SHA1

    e1f7deb5776188fa741e4d59f356cdffaa2d0acb

  • SHA256

    ce0ce4022f474488bbbbb47ccdc934550792ad608e3dbee7282257511e8f9869

  • SHA512

    1543d54d5d896d4231750800d93d75ba093684446d11f8ae5adaeb68a0268cbfdb3fb0e64b9f377ad521ec79cffda416b54f59a0df43ce1a90564c589c9708dd

  • SSDEEP

    6144:X2UIfrt3+TetonBi3QxRy4g09ICSnqf9uSUgkxtpsaPjK/bEoK828fwAoEn+M8H:X2Prt3+TetonBi3QxRwfnqf9uSUgkxtZ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce0ce4022f474488bbbbb47ccdc934550792ad608e3dbee7282257511e8f9869.exe
    "C:\Users\Admin\AppData\Local\Temp\ce0ce4022f474488bbbbb47ccdc934550792ad608e3dbee7282257511e8f9869.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Users\Admin\ynzoux.exe
      "C:\Users\Admin\ynzoux.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ynzoux.exe

    Filesize

    216KB

    MD5

    176592f0f557fc2f2dc9bede69219b27

    SHA1

    843ce33e89b9b614ed0f05cbe865c0dca6dd77eb

    SHA256

    3b63b0cfa57ba055af19d4885d78bd264cc4fcbd62d4ffd1828ed44bb47439ec

    SHA512

    efbb5f90772c4412771a2b69b31dd190d30d7ffcf77c3ac52279e5bd8b59e9cabec888cf21bc87ef75e35ef9a2dfff0558b68746139b7de46f99bfec7b155b95