Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 07:15

General

  • Target

    0b4ab6b9644997979b1e519a6e16ba3f1ecbd5087f9c85a5f66594ec0ecc45b0.exe

  • Size

    192KB

  • MD5

    515bbd1877064455ca2d3d21f2a44a20

  • SHA1

    ec7682773685df6af68ac9e92a817a877dedca3f

  • SHA256

    0b4ab6b9644997979b1e519a6e16ba3f1ecbd5087f9c85a5f66594ec0ecc45b0

  • SHA512

    c13d5a2c4498de713eb08c10ec72bd9e6b6812c8aec49476824c36edd18aa7d8511ef4b7cc58bd92b24a670fa777b7567f030171322faf42f1adcbfe4d870494

  • SSDEEP

    3072:wu8+XROOBrpM3lt0bqO4deKIpS2Q9tC3UwtxaTSGzGXDzp8D8OJbhaDDe3oZO:oOBr63cbqO40K394aTSGzGZ8ognYM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b4ab6b9644997979b1e519a6e16ba3f1ecbd5087f9c85a5f66594ec0ecc45b0.exe
    "C:\Users\Admin\AppData\Local\Temp\0b4ab6b9644997979b1e519a6e16ba3f1ecbd5087f9c85a5f66594ec0ecc45b0.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Users\Admin\keeoxu.exe
      "C:\Users\Admin\keeoxu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\keeoxu.exe

    Filesize

    192KB

    MD5

    123b79e7cb5895fd5bd3a6b30d085583

    SHA1

    4b256721e0145b4f2006917d333e824b5b4e6a7d

    SHA256

    2bea632799d31a451e82f878f0b031ba22eeb02a924bca2326fd03b972c473c7

    SHA512

    57dfeb32f91a6a882f8ab4bff63e403e65008cc5eeb22e2bb97e3d2c3edff9c64c21b07c676c48dd767837d86176ed435442217cdfbbe5776d5322d051c29a00

  • C:\Users\Admin\keeoxu.exe

    Filesize

    192KB

    MD5

    123b79e7cb5895fd5bd3a6b30d085583

    SHA1

    4b256721e0145b4f2006917d333e824b5b4e6a7d

    SHA256

    2bea632799d31a451e82f878f0b031ba22eeb02a924bca2326fd03b972c473c7

    SHA512

    57dfeb32f91a6a882f8ab4bff63e403e65008cc5eeb22e2bb97e3d2c3edff9c64c21b07c676c48dd767837d86176ed435442217cdfbbe5776d5322d051c29a00

  • memory/2532-134-0x0000000000000000-mapping.dmp