Analysis

  • max time kernel
    153s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 22:08

General

  • Target

    96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe

  • Size

    116KB

  • MD5

    6442c026152250dcb2d7f29fde93da7f

  • SHA1

    24a0ee00f31808913c143e37ba292944b4d052f4

  • SHA256

    96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4

  • SHA512

    7befcc0bcaf94be1a5f4efa4e2b6827c7cfe9c56ced0f196dfc72b84d29391349e1b2ff7048065f7e1d8cab2258a41f4b0feb6777acfba0d9c46d20e6d4ca80d

  • SSDEEP

    1536:Km0TcIW9MtpJUlUk+++pZgGEbplftRkDhfdxoMqYjFe1JsW0KuwOZZZZH1gMiZI:70T2MBUlUIRsjsh0xdZZZZVgu

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe
    "C:\Users\Admin\AppData\Local\Temp\96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\juoawap.exe
      "C:\Users\Admin\juoawap.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\juoawap.exe

    Filesize

    116KB

    MD5

    cc33dbf13549f0c2e82ffd5aed1705b7

    SHA1

    338785698163cbd2fd2d12d71412dbb43897fe82

    SHA256

    3db34572f4650974c87359d410acea9ad4fc0ba6e9d81df8b0fb3f2dfde996e6

    SHA512

    1260ce5bfa9e4bef8045428ad55d18e6510c7eda3d957f9e20959336e022e6b2ceaecc89d983719667fa7c0a8c50a9505db2894673d0200299f793385c2cf5fa

  • C:\Users\Admin\juoawap.exe

    Filesize

    116KB

    MD5

    cc33dbf13549f0c2e82ffd5aed1705b7

    SHA1

    338785698163cbd2fd2d12d71412dbb43897fe82

    SHA256

    3db34572f4650974c87359d410acea9ad4fc0ba6e9d81df8b0fb3f2dfde996e6

    SHA512

    1260ce5bfa9e4bef8045428ad55d18e6510c7eda3d957f9e20959336e022e6b2ceaecc89d983719667fa7c0a8c50a9505db2894673d0200299f793385c2cf5fa