Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2022 19:51

General

  • Target

    a87fa6e062c3c2dd9e21f17ea5f281785bd346b725cf010e0746cd86fe581ee2.exe

  • Size

    84KB

  • MD5

    6101fda3b80146753f1c7c5abbd36d17

  • SHA1

    31f20990a690236ff77fd8461c611ef6db30d969

  • SHA256

    a87fa6e062c3c2dd9e21f17ea5f281785bd346b725cf010e0746cd86fe581ee2

  • SHA512

    09fa993c33694a87a1bf56998a2649f95ce0e362d8c568535d39147b24532cf11baeb701494046b3d4ffec9c835170025a017beb5a96074c7019a4e6bb86ae07

  • SSDEEP

    768:9G9RIXmuec4OdJNUC1x2avPPpykILkGuIBLP3nEZCcLX/CVSFJ0T72Uap5/7TONO:9kZOdUCJwVu1ocTzFJ0T72VpF7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a87fa6e062c3c2dd9e21f17ea5f281785bd346b725cf010e0746cd86fe581ee2.exe
    "C:\Users\Admin\AppData\Local\Temp\a87fa6e062c3c2dd9e21f17ea5f281785bd346b725cf010e0746cd86fe581ee2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\maeroih.exe
      "C:\Users\Admin\maeroih.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4232

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\maeroih.exe

    Filesize

    84KB

    MD5

    37c05df6313ef445782b96b4f50161c5

    SHA1

    132718fab88b5b88d66e0dc7aa61d28f7774d5b4

    SHA256

    d3a8d5d6f5021ddd24b1d9ca63aabb812f4b2778283b0f9cdc4bace7610ba420

    SHA512

    5e0336505378227e83d90e0d708b69704977d87b90207c038678861f1ad05d2f7def8772bc90cdd73277ec8ae077c9340daddf464f568a02a0bdfb710750e3c9

  • C:\Users\Admin\maeroih.exe

    Filesize

    84KB

    MD5

    37c05df6313ef445782b96b4f50161c5

    SHA1

    132718fab88b5b88d66e0dc7aa61d28f7774d5b4

    SHA256

    d3a8d5d6f5021ddd24b1d9ca63aabb812f4b2778283b0f9cdc4bace7610ba420

    SHA512

    5e0336505378227e83d90e0d708b69704977d87b90207c038678861f1ad05d2f7def8772bc90cdd73277ec8ae077c9340daddf464f568a02a0bdfb710750e3c9