Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 15:38

General

  • Target

    039a63863f47b6b986cc3b914acd72cac7426c5d89d0cbf89c9b0b0395523366.exe

  • Size

    104KB

  • MD5

    4bcc44240850f05632074900a95446c0

  • SHA1

    bb6fe39f1f2265fb011637758d72e1b97da6779c

  • SHA256

    039a63863f47b6b986cc3b914acd72cac7426c5d89d0cbf89c9b0b0395523366

  • SHA512

    896bed3b0f551f14eed5290d0062e03eb6803c3dd4101404146cf337503f7e87ebf162db2508ea4bb8e77ab4ac184176bcc31dc5f9236dd1c9b3b77154838f10

  • SSDEEP

    1536:bVhvr9fKtSieh6hC3KwTHlyHcw1rqVjSxakAyBGGcJ5J9r:RhTlG/ehWwTHlyHBQNSxWJ9r

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\039a63863f47b6b986cc3b914acd72cac7426c5d89d0cbf89c9b0b0395523366.exe
    "C:\Users\Admin\AppData\Local\Temp\039a63863f47b6b986cc3b914acd72cac7426c5d89d0cbf89c9b0b0395523366.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3808
    • C:\Users\Admin\cbqey.exe
      "C:\Users\Admin\cbqey.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\cbqey.exe

    Filesize

    104KB

    MD5

    3c1777f50e7db8684f435cd4e87070ae

    SHA1

    47611003d3467a3e9f4b9ef9cea97baf7662b8b0

    SHA256

    32d4945d2c725e0c7f83723328b4d88e7fce87430ce663f2cabc807a014d4834

    SHA512

    2c7fd6c18b480678d46d6200f15f5f901aac74b0e4d73cd0bb10292a9a3919845317c6d5f6a5ae2d9634dbdbcebffaf710823470a7b2fbc4e0fad843d9ef7832

  • C:\Users\Admin\cbqey.exe

    Filesize

    104KB

    MD5

    3c1777f50e7db8684f435cd4e87070ae

    SHA1

    47611003d3467a3e9f4b9ef9cea97baf7662b8b0

    SHA256

    32d4945d2c725e0c7f83723328b4d88e7fce87430ce663f2cabc807a014d4834

    SHA512

    2c7fd6c18b480678d46d6200f15f5f901aac74b0e4d73cd0bb10292a9a3919845317c6d5f6a5ae2d9634dbdbcebffaf710823470a7b2fbc4e0fad843d9ef7832