Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 00:05

General

  • Target

    b2aa3749020a4038daf7cdea45008ba26bf6ff9b12a7df801ad7f33c59ffd4b8.exe

  • Size

    108KB

  • MD5

    6412492cb3f44d66d8f68891645d97b0

  • SHA1

    ae7bd56d73624b832f6db3fe01b4aa889b5e2b81

  • SHA256

    b2aa3749020a4038daf7cdea45008ba26bf6ff9b12a7df801ad7f33c59ffd4b8

  • SHA512

    b35aa14610ec8eac22946094b5447f0652e2a13f75335be475dbf507896fe8567ef9b8580c30586a66e946384fba5e281861e35ce919a204d08f3f617928b737

  • SSDEEP

    1536:bG+MKiB6oQ7Lh5+sXmNP0ttlPXLq0zTrk3:qDmoIeZPsXTzTo3

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2aa3749020a4038daf7cdea45008ba26bf6ff9b12a7df801ad7f33c59ffd4b8.exe
    "C:\Users\Admin\AppData\Local\Temp\b2aa3749020a4038daf7cdea45008ba26bf6ff9b12a7df801ad7f33c59ffd4b8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\pbkiux.exe
      "C:\Users\Admin\pbkiux.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4932

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\pbkiux.exe

          Filesize

          108KB

          MD5

          fec3e7a4ede4e8a382dff7f236c9e384

          SHA1

          b8983f4bdd3e8e8c3c34b7b888b1afecd63f3c98

          SHA256

          2a66fc6b831320049c9a33cdeb9d7b372816e2ef085152b13e810149e0268cb7

          SHA512

          6ee790a14135634807807a296c586d74be3b8512c692f123c291dd0c513b50919308499b092699f289a0164857c77ba954a51dc79e7ca627eda0bbb16b27fcc3

        • C:\Users\Admin\pbkiux.exe

          Filesize

          108KB

          MD5

          fec3e7a4ede4e8a382dff7f236c9e384

          SHA1

          b8983f4bdd3e8e8c3c34b7b888b1afecd63f3c98

          SHA256

          2a66fc6b831320049c9a33cdeb9d7b372816e2ef085152b13e810149e0268cb7

          SHA512

          6ee790a14135634807807a296c586d74be3b8512c692f123c291dd0c513b50919308499b092699f289a0164857c77ba954a51dc79e7ca627eda0bbb16b27fcc3