Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 02:13

General

  • Target

    8487bafd2a57df5fdf0f42e5c561ad1ec3c145b67978dbfeb3aeb15b1211ccb9.exe

  • Size

    152KB

  • MD5

    8fa16f055810e6f83d51d41edb4d330e

  • SHA1

    5dd5949ee620a06e6e9355eb0bdf3d3233fe7380

  • SHA256

    8487bafd2a57df5fdf0f42e5c561ad1ec3c145b67978dbfeb3aeb15b1211ccb9

  • SHA512

    97a5955ee51b979af815efa75aaf603e1c307a2c55a2151b5adec6116f5a14d40048c3ab525104237c2276a248a2013fcaa65f05d2792b0b0481270b90b3f321

  • SSDEEP

    3072:V5EG8HCzwrCaHHvhtbz0wXtV2eZDEUXni7fo7KSif8xWM33r3k1jTCZU4oQZiEtA:sGyCzwrCW/0AHa8nuo7KSif8xWM33r3k

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8487bafd2a57df5fdf0f42e5c561ad1ec3c145b67978dbfeb3aeb15b1211ccb9.exe
    "C:\Users\Admin\AppData\Local\Temp\8487bafd2a57df5fdf0f42e5c561ad1ec3c145b67978dbfeb3aeb15b1211ccb9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Users\Admin\heujoy.exe
      "C:\Users\Admin\heujoy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4912

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\heujoy.exe

          Filesize

          152KB

          MD5

          53f10f4612c6ab9927871ec5f2671bb7

          SHA1

          9473eff6bc896613083f6cce3ed6f25d3cca0793

          SHA256

          95f1c75b5926618155a022bfabac6baa4cf70ab6b452ee54548b68cf1d5c11c4

          SHA512

          ffc958c8cc4fc4151429994e364334646a236dfaa1bd66edc720f699575c062b60c9d86fd1f6d762986ad2a286c929c236cff6887068129b7418c6306226478a

        • C:\Users\Admin\heujoy.exe

          Filesize

          152KB

          MD5

          53f10f4612c6ab9927871ec5f2671bb7

          SHA1

          9473eff6bc896613083f6cce3ed6f25d3cca0793

          SHA256

          95f1c75b5926618155a022bfabac6baa4cf70ab6b452ee54548b68cf1d5c11c4

          SHA512

          ffc958c8cc4fc4151429994e364334646a236dfaa1bd66edc720f699575c062b60c9d86fd1f6d762986ad2a286c929c236cff6887068129b7418c6306226478a