Analysis

  • max time kernel
    156s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 10:14

General

  • Target

    58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe

  • Size

    184KB

  • MD5

    f0ad77a4e22b08be9ebf90073b061731

  • SHA1

    b95dcccfb1b871181eaa74ba683f5f0edbda6cc7

  • SHA256

    58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717

  • SHA512

    e133b5564ae6df4c81749fe67095484ea7fd081a93f9805cabb3c490c1d0836683c92c53694bf87079a55c00ede5ad5ba4aeaf92328e386392b1301750669cb1

  • SSDEEP

    3072:VWwAMlXL6KvWeRl6Knvmb7/D26DKcAA6vQOm34lK5/si+FS3:pX5VREKnvmb7/D26DKcV67m34E5/s7S

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe
    "C:\Users\Admin\AppData\Local\Temp\58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\teiulih.exe
      "C:\Users\Admin\teiulih.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\teiulih.exe

    Filesize

    184KB

    MD5

    5b1a9d032fe5b805e2cd33007b9292fe

    SHA1

    5779aec43957e9ab61045fb9cc0570163adeb010

    SHA256

    f31932d036a60e2948af436b66c5a1d0e10ac61898255c4b45b0483325297faf

    SHA512

    b94494362ee7e39baae5fe89d45c07e549c7a5480d363d9419d53e32304866fb63f04cadfa02d2098adf5622ad9b9b165b5886cd9d682f9e88216e3fbf2c70d9

  • C:\Users\Admin\teiulih.exe

    Filesize

    184KB

    MD5

    5b1a9d032fe5b805e2cd33007b9292fe

    SHA1

    5779aec43957e9ab61045fb9cc0570163adeb010

    SHA256

    f31932d036a60e2948af436b66c5a1d0e10ac61898255c4b45b0483325297faf

    SHA512

    b94494362ee7e39baae5fe89d45c07e549c7a5480d363d9419d53e32304866fb63f04cadfa02d2098adf5622ad9b9b165b5886cd9d682f9e88216e3fbf2c70d9