Analysis

  • max time kernel
    151s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 01:02

General

  • Target

    8df451e874f4246e877ed9bbb07b53039764fe74a0c5077c02f05e25264596b7.exe

  • Size

    116KB

  • MD5

    1e53a4a0891621320d8f53c698676281

  • SHA1

    b64dfb8f637f2a7e0b807d48a66f11f44e1c6331

  • SHA256

    8df451e874f4246e877ed9bbb07b53039764fe74a0c5077c02f05e25264596b7

  • SHA512

    e708aff577195658708c7d1043c4fa8cf9901c5794d3ee9533566dec4501591b76ff8f8de199a0ebe1d72d80b898381ec4b1b81d365fef38b2b716d65146b220

  • SSDEEP

    3072:s0T94Xnr99Rx7D/ONLd01eWkVkMfwYHX0WRSO:dZ477D2NLd01eWkVkMfwYHEWRn

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8df451e874f4246e877ed9bbb07b53039764fe74a0c5077c02f05e25264596b7.exe
    "C:\Users\Admin\AppData\Local\Temp\8df451e874f4246e877ed9bbb07b53039764fe74a0c5077c02f05e25264596b7.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4084
    • C:\Users\Admin\vfzuur.exe
      "C:\Users\Admin\vfzuur.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vfzuur.exe

    Filesize

    116KB

    MD5

    174113356a85299ea0312104f6cfb0b4

    SHA1

    86a5a8270dc189cc7d2e08d5ac11bf9abfac36db

    SHA256

    d5b5e8a34d6ceb3f67a0949d223cb3e53031ac5c571efbf7dba9290052b49dad

    SHA512

    a8785a14d00f051403409731bfc2aced22d1d5586f45e1046fcd94b221923f790294e3a0f4ff33a73d2b2343aa2873ef9e48407682e693865867b997a4d5d6e2

  • C:\Users\Admin\vfzuur.exe

    Filesize

    116KB

    MD5

    174113356a85299ea0312104f6cfb0b4

    SHA1

    86a5a8270dc189cc7d2e08d5ac11bf9abfac36db

    SHA256

    d5b5e8a34d6ceb3f67a0949d223cb3e53031ac5c571efbf7dba9290052b49dad

    SHA512

    a8785a14d00f051403409731bfc2aced22d1d5586f45e1046fcd94b221923f790294e3a0f4ff33a73d2b2343aa2873ef9e48407682e693865867b997a4d5d6e2

  • memory/4860-134-0x0000000000000000-mapping.dmp