Analysis

  • max time kernel
    268s
  • max time network
    271s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-07-2021 19:10

General

  • Target

    loader.exe

  • Size

    461KB

  • MD5

    09c09a4dd0bca845bbfbe71efc4c744a

  • SHA1

    bfcd2f2e56e8e7916033eb60494757f781743498

  • SHA256

    812f06bb937d810962f9cc587fb10a1f848ddd58e4fd028783f9c2517df81dfb

  • SHA512

    0fa2518efc2c1e5a840794e70a803cc7c7b9610c7823e44c23d721fce3fcf8ad91cd2363689d1fefd25c988cf24f4957e00c6329fcc109ad36f20c5649ce2b95

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 33 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\loader.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1600
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
      PID:2136

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads