Analysis

  • max time kernel
    151s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 03:03

General

  • Target

    beaf4b1325363e6eff197c2335c5cf15d06b114eee923d8172aaef287c4b00fb.exe

  • Size

    172KB

  • MD5

    5591e8e30a3a5b090c9c1415b51139c0

  • SHA1

    75cd45a67ba8e18fa79ac6756cd565b1eb264512

  • SHA256

    beaf4b1325363e6eff197c2335c5cf15d06b114eee923d8172aaef287c4b00fb

  • SHA512

    b4588d931c20542128bcc0f5e355158065d325b8e05a565265106c326e370c464f0a929d4a86d3e1b784960f1e7c2599ddd3089a2dd2090ce06226f0b8788824

  • SSDEEP

    3072:udHhJx9lTmnKep9Chu7Gbwhd5eEQMSZdSkxiAPbmWU09LjM5:e15epqu7CwteASZdBxPbPpM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beaf4b1325363e6eff197c2335c5cf15d06b114eee923d8172aaef287c4b00fb.exe
    "C:\Users\Admin\AppData\Local\Temp\beaf4b1325363e6eff197c2335c5cf15d06b114eee923d8172aaef287c4b00fb.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Users\Admin\memot.exe
      "C:\Users\Admin\memot.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\memot.exe

    Filesize

    172KB

    MD5

    c9db486f498afeb2a2b1a54294092da5

    SHA1

    574780283f4b175d7f4bcb6f686e9e40f2cc410b

    SHA256

    9eafb816cb0994692e7b815aa644324bddeb7e9fec0ce1bf3237129cf207719f

    SHA512

    5441f11bf4c83c712c0275ff9401a37f022205bfd4f82591c6df884cfdb44a3a3b51b98fc501d9104587e60f5e2dbe5b2df09560186104baa4ac48f4844455d5

  • C:\Users\Admin\memot.exe

    Filesize

    172KB

    MD5

    c9db486f498afeb2a2b1a54294092da5

    SHA1

    574780283f4b175d7f4bcb6f686e9e40f2cc410b

    SHA256

    9eafb816cb0994692e7b815aa644324bddeb7e9fec0ce1bf3237129cf207719f

    SHA512

    5441f11bf4c83c712c0275ff9401a37f022205bfd4f82591c6df884cfdb44a3a3b51b98fc501d9104587e60f5e2dbe5b2df09560186104baa4ac48f4844455d5