Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 05:04

General

  • Target

    12071c161bcef3d371fb232edaaa0f88f5cf89bb07e6bd466e2bc903bd52bf1aN.exe

  • Size

    296KB

  • MD5

    01eef24d9bdcd750d756c5e8a08b2900

  • SHA1

    3bd5d15aa29289327e2dbfb7de902373094de9d2

  • SHA256

    12071c161bcef3d371fb232edaaa0f88f5cf89bb07e6bd466e2bc903bd52bf1a

  • SHA512

    fcbc4a8d87b622fb8e8b0981e7d44023ca98e2514b99a6e7275e62d140e0e4855928f06eb92bb76274bfb132c160180d85b7b9ac204737d6ce904b8cabc0016d

  • SSDEEP

    6144:72iFRsJcCf2lfKgO32mO1IdifegrSQOJMmSnxtAPUWJj9/P/oEAlu9UY6LxP:7hUTfqmjZHJFnPnp6l2U1P

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12071c161bcef3d371fb232edaaa0f88f5cf89bb07e6bd466e2bc903bd52bf1aN.exe
    "C:\Users\Admin\AppData\Local\Temp\12071c161bcef3d371fb232edaaa0f88f5cf89bb07e6bd466e2bc903bd52bf1aN.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\mikuh.exe
      "C:\Users\Admin\mikuh.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3528
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    PID:2708
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\mikuh.exe

    Filesize

    296KB

    MD5

    a572a61f3a4c454ae4afe1ac73684f11

    SHA1

    cc2209e6ff5870fb1e92a539f36bc80ca6ddf8d9

    SHA256

    955fa86717b1a0f1e349fc3176974d6466970defa5648ffb379c4fc651e50c1b

    SHA512

    d37c2910338660a1a4d284488594fdce3214bc5e8857a2e6ed9d9045b4ca22fb2cd83c03a952cbedd9d7b36d9759446e3eec9b200c15f1510801e44e843e0f4e