Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 02:48

General

  • Target

    660bb456ba5392170d165a032ce81db4cc89ffbb1df3402793763bb396ef1b57.exe

  • Size

    152KB

  • MD5

    621450cb8e67be985c760728d0139a1d

  • SHA1

    b84220b84de88f124cc0ab0050ed0c89b2187e4e

  • SHA256

    660bb456ba5392170d165a032ce81db4cc89ffbb1df3402793763bb396ef1b57

  • SHA512

    45b9593434aaaac12e6eb58f0c8617c2ce0a1b856be4614eac87ebdc64dff484f6e031ebd63e7a1bccce5671c03b604865944db8f45078fe49c8034a112554aa

  • SSDEEP

    1536:M8MYeonj9tk3MBGI9i7npIRkM4HPdKMq5ELEDkb09cbZTrhshmB3tI:MPEnj9t4MBGIGuRnKP4MqUAoSh

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\660bb456ba5392170d165a032ce81db4cc89ffbb1df3402793763bb396ef1b57.exe
    "C:\Users\Admin\AppData\Local\Temp\660bb456ba5392170d165a032ce81db4cc89ffbb1df3402793763bb396ef1b57.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\ptkuoz.exe
      "C:\Users\Admin\ptkuoz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ptkuoz.exe

    Filesize

    152KB

    MD5

    7747950f194cac63f75651940e69485f

    SHA1

    3b4f9adc58c433572bd7f7def0ee6690ae1681fc

    SHA256

    eabf75744acc721cf0031dfb3704b1c7e4e5299e81f9255eddb231552604f646

    SHA512

    4b2b2ca0fb1835ec928732c11f21f876b178d4c5dbbb62b5a313935c189f5bbf922355ce02b7a2559aa585cb4717afd10a3c269ec71722136b5b7b6b7e28ff2a

  • C:\Users\Admin\ptkuoz.exe

    Filesize

    152KB

    MD5

    7747950f194cac63f75651940e69485f

    SHA1

    3b4f9adc58c433572bd7f7def0ee6690ae1681fc

    SHA256

    eabf75744acc721cf0031dfb3704b1c7e4e5299e81f9255eddb231552604f646

    SHA512

    4b2b2ca0fb1835ec928732c11f21f876b178d4c5dbbb62b5a313935c189f5bbf922355ce02b7a2559aa585cb4717afd10a3c269ec71722136b5b7b6b7e28ff2a

  • memory/3876-134-0x0000000000000000-mapping.dmp