Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 02:36

General

  • Target

    c000d29db32fe80f21e5b77386ff8f0ed69716bb96feb342f8b8f3bbae4bebe5.exe

  • Size

    92KB

  • MD5

    17bb0c995b2baba0f3434a0bfa2232ac

  • SHA1

    cb9cc3c59e4a2998f2265450897950155c337de2

  • SHA256

    c000d29db32fe80f21e5b77386ff8f0ed69716bb96feb342f8b8f3bbae4bebe5

  • SHA512

    0c7edc9d3d9b97265625d82246817d39f7c911180275329bfad4364a67773b0c1e039b92206bb4d506b982dd6391c8a73c48235df58ee674f03fb42496869be2

  • SSDEEP

    1536:UzJTG4EVT8JNenyIGmvcTlfbfwKipwFJ0T72mocT:vxYhTxx5FJ0T72mBT

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c000d29db32fe80f21e5b77386ff8f0ed69716bb96feb342f8b8f3bbae4bebe5.exe
    "C:\Users\Admin\AppData\Local\Temp\c000d29db32fe80f21e5b77386ff8f0ed69716bb96feb342f8b8f3bbae4bebe5.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Users\Admin\ceooz.exe
      "C:\Users\Admin\ceooz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ceooz.exe

    Filesize

    92KB

    MD5

    499f389fd19cb266f5e696a8c07649b6

    SHA1

    7ee2d9b47956d2447ca830ad086d8ece92feeffe

    SHA256

    b4758171f7e8bba6059d9f1c74a57c83b8a598369ee0231b13b0879d86688a8d

    SHA512

    dff69d2f94bc44a0387587bc4015d7766cf46f61e6c3204cdfa5f4d7fbdcbb5a37fcb844848bbcc73b502f39e9272df216b4e0bf7b493aa7607025e42d2559c8