Analysis

  • max time kernel
    161s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 10:27

General

  • Target

    33ae72525d0263f9a7f5e9fa350e8707c719564cb628458f9c6d69a8c696ec90.exe

  • Size

    256KB

  • MD5

    9b4a98fcabca2211163ddb197454ed34

  • SHA1

    28d6a4c25dd121d50e9198eee9324fb717eb5943

  • SHA256

    33ae72525d0263f9a7f5e9fa350e8707c719564cb628458f9c6d69a8c696ec90

  • SHA512

    57445ccfa1902e0732d4a05a8d157813a8e39106247655244786ffa8c1f9d14872668f4304e63f2029d571db39f987f3547424643f6929ec272f013d0f51ff15

  • SSDEEP

    6144:fBawbQXn2J5V2aWOKojDOgbTnNkyjZjj+:fAwbQWoOKojDOgbTNku

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33ae72525d0263f9a7f5e9fa350e8707c719564cb628458f9c6d69a8c696ec90.exe
    "C:\Users\Admin\AppData\Local\Temp\33ae72525d0263f9a7f5e9fa350e8707c719564cb628458f9c6d69a8c696ec90.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Users\Admin\luikii.exe
      "C:\Users\Admin\luikii.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\luikii.exe

    Filesize

    256KB

    MD5

    8bbc3dee2b39c334ab3a0769ba78adfb

    SHA1

    ddf9092db94c066153854b0bbcafb9f35a3c7b5b

    SHA256

    aa0d9268f096cd0d2407bb2b3cfb7c96eee237b1f1eb82ff375f3919b3b0953b

    SHA512

    7473d4ec496c90f028bff59cd22a47073b58dfee03e889db47b69a6e82b09517ead33876670f758c24854d8bde795de0af6254d23e1d03d93f79b28f01b38394

  • C:\Users\Admin\luikii.exe

    Filesize

    256KB

    MD5

    8bbc3dee2b39c334ab3a0769ba78adfb

    SHA1

    ddf9092db94c066153854b0bbcafb9f35a3c7b5b

    SHA256

    aa0d9268f096cd0d2407bb2b3cfb7c96eee237b1f1eb82ff375f3919b3b0953b

    SHA512

    7473d4ec496c90f028bff59cd22a47073b58dfee03e889db47b69a6e82b09517ead33876670f758c24854d8bde795de0af6254d23e1d03d93f79b28f01b38394

  • memory/4832-134-0x0000000000000000-mapping.dmp