Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 02:54

General

  • Target

    12b2e59979e3fa9cf78de9454abc902e4ca5231beb0bf047c08ef25864e5c7ac.exe

  • Size

    192KB

  • MD5

    6ec4773066390c793d4f7d011d8361c2

  • SHA1

    6a5d14f41ad49c919de7dd0e369eaf36a9d79ce5

  • SHA256

    12b2e59979e3fa9cf78de9454abc902e4ca5231beb0bf047c08ef25864e5c7ac

  • SHA512

    697aa9569a8b063aea2541d84d32954fd5a3062b4d8e87a179d3f3bf3ab38d7e7049aafaa3821d1f141449623a4b2c7fa3f5d9d7b4a23fcaa894628d23fcef34

  • SSDEEP

    1536:7aHmH9uHl96PRi4iti93MH9iV6MRfWzzp3BHCeQbIYL29oPLJZ514R9/eJqi/7:qmH9a9oRi4itiSHXzp3fYhPLJGaD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12b2e59979e3fa9cf78de9454abc902e4ca5231beb0bf047c08ef25864e5c7ac.exe
    "C:\Users\Admin\AppData\Local\Temp\12b2e59979e3fa9cf78de9454abc902e4ca5231beb0bf047c08ef25864e5c7ac.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Users\Admin\feazuec.exe
      "C:\Users\Admin\feazuec.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\feazuec.exe

    Filesize

    192KB

    MD5

    6c12ede9a3af53bfe7fbf540b9989877

    SHA1

    f6ce4f6d67e7452fa40a6e679a00dbf3fcd98ea1

    SHA256

    e39aa0f69c5cb8b9502969025768856732136bd39af645b0d648c3452ee93677

    SHA512

    077b308e9aa2d128bb1b674f6d24dcff4a40a06fe46f97f1302156e13f354bd62304c807d26272ed8839ef42705e5b83e026bcfe7d7048c734c39abe2891e22b