Analysis

  • max time kernel
    156s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 04:07

General

  • Target

    20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe

  • Size

    124KB

  • MD5

    fe5d48d60fc5084976230c74f3057fd8

  • SHA1

    f88dcc9664948bb47707041c2ce18aed58001b9c

  • SHA256

    20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2

  • SHA512

    2f80dfa8f203ed503797b7ddc24c230c5dca0425e879f0a38b6b8999586191700a368f60038e8fb388e562967815e68c6e24e56708065bc9bf22e8dc417a5092

  • SSDEEP

    1536:SotkjdTQ6ecmU0GgAJa0P1kNmKldCMhdu8KWP/nTn8nBP9VeRPNeG0h/y:pkjC6ecmU0GgAT9QIq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe
    "C:\Users\Admin\AppData\Local\Temp\20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\maovu.exe
      "C:\Users\Admin\maovu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2408
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:1940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\maovu.exe

    Filesize

    124KB

    MD5

    9c34ebb53a8650be679bd51787ba0ea5

    SHA1

    d7f5360f3b58aed93ab353d734f5b4193580ec6c

    SHA256

    87b954ada981a727e1954de42ea7b883f579035af8740087855c5acc99cf6e81

    SHA512

    cce6a79295ba85ddd28df2f7cf078795f7c7d7ac5c0f0bd8954a05ff44765e12df5257e188e272c0df2c1e3d583df6ffc90a79c39a562944896d29f0c95821e2

  • C:\Users\Admin\maovu.exe

    Filesize

    124KB

    MD5

    9c34ebb53a8650be679bd51787ba0ea5

    SHA1

    d7f5360f3b58aed93ab353d734f5b4193580ec6c

    SHA256

    87b954ada981a727e1954de42ea7b883f579035af8740087855c5acc99cf6e81

    SHA512

    cce6a79295ba85ddd28df2f7cf078795f7c7d7ac5c0f0bd8954a05ff44765e12df5257e188e272c0df2c1e3d583df6ffc90a79c39a562944896d29f0c95821e2