Analysis

  • max time kernel
    152s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2022, 19:50

General

  • Target

    1b1d02c6a9e324bb1ab8fbc403156bc3ef3a7ec91b2e2923d5535792d607bc07.exe

  • Size

    312KB

  • MD5

    6e5814760cfb99a233f60e4a87e36ab0

  • SHA1

    ffc8993f058f0b50b2fc96abeb66cf50393cd63a

  • SHA256

    1b1d02c6a9e324bb1ab8fbc403156bc3ef3a7ec91b2e2923d5535792d607bc07

  • SHA512

    3e6fcd58ada469de069cae2c7d489b35d04809f5d298e929fef31948cb6dc17ff44f698dd6b828955a8223a184bc8109b2f7a03d4187cb62219520f00ef33f44

  • SSDEEP

    6144:Opbc0f7XP+g3AGJpWVzu2RHeEgRK/fObT/bGiJKv6R7MkZ4lUr8W9HuOGKqvsMMJ:Mw27/XvLWpuEeEgRK/fObT/bGiJlMkZp

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b1d02c6a9e324bb1ab8fbc403156bc3ef3a7ec91b2e2923d5535792d607bc07.exe
    "C:\Users\Admin\AppData\Local\Temp\1b1d02c6a9e324bb1ab8fbc403156bc3ef3a7ec91b2e2923d5535792d607bc07.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Users\Admin\meroz.exe
      "C:\Users\Admin\meroz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4148

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\meroz.exe

    Filesize

    312KB

    MD5

    eb4695a7ac3407d123679f16959c43e9

    SHA1

    ae3cb3de9145ff97e29d1e843e15409b7b5e7311

    SHA256

    4d0b3d8a4c226b9ddc966a58e7ec8b4f226ba3b88db2e8ccffadb440e8a48366

    SHA512

    9a53dfb8b91d07671f16231f89f8e1b63b0b96b2775b0c25ac6fb5ae62b148d080b4dd105d5f1928f2f9604b62a90f7a9ca6de7472f5cdf784a8ef51299afa9a

  • C:\Users\Admin\meroz.exe

    Filesize

    312KB

    MD5

    eb4695a7ac3407d123679f16959c43e9

    SHA1

    ae3cb3de9145ff97e29d1e843e15409b7b5e7311

    SHA256

    4d0b3d8a4c226b9ddc966a58e7ec8b4f226ba3b88db2e8ccffadb440e8a48366

    SHA512

    9a53dfb8b91d07671f16231f89f8e1b63b0b96b2775b0c25ac6fb5ae62b148d080b4dd105d5f1928f2f9604b62a90f7a9ca6de7472f5cdf784a8ef51299afa9a

  • memory/4148-141-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/4148-142-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/4308-132-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/4308-133-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB