Analysis

  • max time kernel
    177s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 00:03

General

  • Target

    cc46745ea6e70cdb1bb32c38b3521a21003dff15f6a2f7a17e77bd25d9bb6ce5.exe

  • Size

    232KB

  • MD5

    64e30714c254d285c8651020eb9aa710

  • SHA1

    1ea331d00b51fb85e5e845587a0ff650d7012489

  • SHA256

    cc46745ea6e70cdb1bb32c38b3521a21003dff15f6a2f7a17e77bd25d9bb6ce5

  • SHA512

    053453ba3c09698ddd0efa7a460b0b04164f403d3597bedaac55e721c9b5d8a27099112ba6a382dc0a00d33727a11f5b2974d9f7a2e68135ad8cc3c0844d85d4

  • SSDEEP

    6144:5yz3PFKs78vpRTlEqxF6snji81RUinKbs0n:WPhu4

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc46745ea6e70cdb1bb32c38b3521a21003dff15f6a2f7a17e77bd25d9bb6ce5.exe
    "C:\Users\Admin\AppData\Local\Temp\cc46745ea6e70cdb1bb32c38b3521a21003dff15f6a2f7a17e77bd25d9bb6ce5.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Users\Admin\raucou.exe
      "C:\Users\Admin\raucou.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\raucou.exe

    Filesize

    232KB

    MD5

    82f4fd385023f05e9517f4919ad1207c

    SHA1

    6a6ebbcb3a253cde54b43fcbebb51bb9088c5d33

    SHA256

    ccef7861cbdda6af7d9d632f19e6915c2337a1e402cd73a0edc0dfadb7c77d72

    SHA512

    b7847e0471582664905872757ffd2b07e6be1e028fb814ee5c58d327c09993419a4b6a4e1f8393200d9a8bd2d3e5fe467c09dc9a0b1f87b5665b3663be9f0490

  • C:\Users\Admin\raucou.exe

    Filesize

    232KB

    MD5

    82f4fd385023f05e9517f4919ad1207c

    SHA1

    6a6ebbcb3a253cde54b43fcbebb51bb9088c5d33

    SHA256

    ccef7861cbdda6af7d9d632f19e6915c2337a1e402cd73a0edc0dfadb7c77d72

    SHA512

    b7847e0471582664905872757ffd2b07e6be1e028fb814ee5c58d327c09993419a4b6a4e1f8393200d9a8bd2d3e5fe467c09dc9a0b1f87b5665b3663be9f0490