Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 02:17

General

  • Target

    82aa3f45d0e71ed4736a8fe0ce1881eaba66b35e4c1ef5b5204816c3167fc48c.exe

  • Size

    188KB

  • MD5

    3c52d0cdccf046da4700f74f1c18c4f7

  • SHA1

    e665066968f4dd7fee2199f9f4aeb870c41fe452

  • SHA256

    82aa3f45d0e71ed4736a8fe0ce1881eaba66b35e4c1ef5b5204816c3167fc48c

  • SHA512

    28b0e0d4d17ae4bf87a11b9ab3d467756f6cb22e7c22b208d78407818e61543341ef89becb660b2afb0cf6280cc260446613a4edcd83dbb956e1cb5c45dd7a16

  • SSDEEP

    3072:x+bMaGph5b/VgpalJEBNmKnvmb7/D26Dv82KSaIwbsf3vxY33kiSEzTDySnI0ngS:uMaohh/W4lJhKnvmb7/D26DE2KSabbqQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82aa3f45d0e71ed4736a8fe0ce1881eaba66b35e4c1ef5b5204816c3167fc48c.exe
    "C:\Users\Admin\AppData\Local\Temp\82aa3f45d0e71ed4736a8fe0ce1881eaba66b35e4c1ef5b5204816c3167fc48c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\muezu.exe
      "C:\Users\Admin\muezu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2572

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\muezu.exe

          Filesize

          188KB

          MD5

          215240355ce9210c66f5396af855b837

          SHA1

          fac9afd33bfe206469613c35d046af97d8cd1a0d

          SHA256

          6ab4b263b4f62a63acfa269f867fbf6dbc3bc021d71bf2cc649e3e4508378475

          SHA512

          a4ccf963efef96e6f921e212ea8d940f682ee8fb751325e418759f0b12ac2ab9d853f0ff889b1f3f9aa88ae9f622d889e5417de90fd35c9f9ab6dda9f2fdc8da

        • C:\Users\Admin\muezu.exe

          Filesize

          188KB

          MD5

          215240355ce9210c66f5396af855b837

          SHA1

          fac9afd33bfe206469613c35d046af97d8cd1a0d

          SHA256

          6ab4b263b4f62a63acfa269f867fbf6dbc3bc021d71bf2cc649e3e4508378475

          SHA512

          a4ccf963efef96e6f921e212ea8d940f682ee8fb751325e418759f0b12ac2ab9d853f0ff889b1f3f9aa88ae9f622d889e5417de90fd35c9f9ab6dda9f2fdc8da