Analysis

  • max time kernel
    193s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 07:39

General

  • Target

    93f4edd6fd20e0aeaec603ea5212c066ef07180301ea53aede7bde05343839f6.exe

  • Size

    80KB

  • MD5

    706c809b5ae21072bfe19e007b27709f

  • SHA1

    64bf2022f8b5d6286a794241fd728c96ee718460

  • SHA256

    93f4edd6fd20e0aeaec603ea5212c066ef07180301ea53aede7bde05343839f6

  • SHA512

    5418980a916b8c3474789fdf2c34e946b715f21b758164c2a5e203e555a70f3b31140cc4e4bff248605b768bceec2859435c8df1568cf41beb9e597d51c68420

  • SSDEEP

    1536:EsKdger16Lti8n42APNR2dcScLcPcxeTanuUHWOls3xxNMq39gk34iS6G:Fe64PNEdcScLcPcfnuH0yG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93f4edd6fd20e0aeaec603ea5212c066ef07180301ea53aede7bde05343839f6.exe
    "C:\Users\Admin\AppData\Local\Temp\93f4edd6fd20e0aeaec603ea5212c066ef07180301ea53aede7bde05343839f6.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3324
    • C:\Users\Admin\gadaq.exe
      "C:\Users\Admin\gadaq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gadaq.exe

    Filesize

    80KB

    MD5

    b11b97b7c3c8c4634a418d98f39212d5

    SHA1

    d283cde5d95694003f1d31fdc6ee861c9b2a7087

    SHA256

    e07716fe77d3f2a56f0c65ea0db541a1ad7f831dcb6a99939c90243f7d9bf209

    SHA512

    d72c0f4dc1d84d173c531dfcc75bae817bbde111009e3800caee19fafbf5bb531dd302ef1c684854a6c0987939ed7f7c892eda15ee2ca95c4da533871ca38061

  • C:\Users\Admin\gadaq.exe

    Filesize

    80KB

    MD5

    b11b97b7c3c8c4634a418d98f39212d5

    SHA1

    d283cde5d95694003f1d31fdc6ee861c9b2a7087

    SHA256

    e07716fe77d3f2a56f0c65ea0db541a1ad7f831dcb6a99939c90243f7d9bf209

    SHA512

    d72c0f4dc1d84d173c531dfcc75bae817bbde111009e3800caee19fafbf5bb531dd302ef1c684854a6c0987939ed7f7c892eda15ee2ca95c4da533871ca38061

  • memory/4720-134-0x0000000000000000-mapping.dmp