Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 00:12

General

  • Target

    5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe

  • Size

    268KB

  • MD5

    6f130f9c3eb29e87b84d9d7979ef9e8c

  • SHA1

    d1c66f06ca5d51c47611427df7b0295bcbb1cd99

  • SHA256

    5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1

  • SHA512

    08e9b8149131d84021055450d29ea056246f8d4c97251ed91da5a6e46152619b83b4b01641bec0fc3b4dd1f780300799a941bb25395bfdde51b9bbcc064e2410

  • SSDEEP

    6144:i/PpbZRZl8z94sYxeTfXys6zlbG95POPHQ7TlSqSeiD4/uhHCA4ydSZb0ng:i/PpbZRn8z94da64RyHQ7TlUJ4/uLng

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe
    "C:\Users\Admin\AppData\Local\Temp\5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\jsqer.exe
      "C:\Users\Admin\jsqer.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4264

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\jsqer.exe

          Filesize

          268KB

          MD5

          ffb6943085ef147dd48e8d96fae771ce

          SHA1

          a035ce783b90fc0b864aab171d7538e77f892f62

          SHA256

          19d52f44e422f8dd6314b3e683266ddd71b4be6aa68ae44bf85bb09a566c69fd

          SHA512

          a7e7746687b376697affd490b2ba3e612c0ade3bbb309755afbb5ff5c1b96c0eede3a00c27c8fc2e9ea127bb011fccaa9a0b42142b1b504da21fd2385a9ad6ed

        • C:\Users\Admin\jsqer.exe

          Filesize

          268KB

          MD5

          ffb6943085ef147dd48e8d96fae771ce

          SHA1

          a035ce783b90fc0b864aab171d7538e77f892f62

          SHA256

          19d52f44e422f8dd6314b3e683266ddd71b4be6aa68ae44bf85bb09a566c69fd

          SHA512

          a7e7746687b376697affd490b2ba3e612c0ade3bbb309755afbb5ff5c1b96c0eede3a00c27c8fc2e9ea127bb011fccaa9a0b42142b1b504da21fd2385a9ad6ed