Analysis

  • max time kernel
    190s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 08:17

General

  • Target

    0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe

  • Size

    128KB

  • MD5

    68b8f085ef2eda3c3f47e11d09d3ccd0

  • SHA1

    4a1f9b84d04927477d5e5137de172f78e7baa2f9

  • SHA256

    0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e

  • SHA512

    a92af16d9933f00a03c736d15ec8d1d491047d61dbc5946954b17bbc3635a93c8ad10411c085886267f6297feed501b0942b28b563c531d422e48b71b647cf1c

  • SSDEEP

    3072:I3wu13y4CpCfCGCCOCwC9CvCFCfCLCvCUCLC2FInROUSRSGSuSQSmSNS4SQSsSTV:hu13yGFInRO

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe
    "C:\Users\Admin\AppData\Local\Temp\0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Users\Admin\kaeehum.exe
      "C:\Users\Admin\kaeehum.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kaeehum.exe

    Filesize

    128KB

    MD5

    be311a19347ac1b1d4791c01444a37a7

    SHA1

    13d32e19c857ec647490d8aefcc18f729296bf7b

    SHA256

    497e27269c26c896de48a29737ee7cc35c9e00a1f5328da46913c518fefd70f4

    SHA512

    e8ddd6ddd576062decc2855503f5abf2f54ed6bcf69ebd1375431f3e58daed25ac4adf560c73d17954959ee35a74b57207456a698e0000bfb4ca4e4d1cfb551e

  • C:\Users\Admin\kaeehum.exe

    Filesize

    128KB

    MD5

    be311a19347ac1b1d4791c01444a37a7

    SHA1

    13d32e19c857ec647490d8aefcc18f729296bf7b

    SHA256

    497e27269c26c896de48a29737ee7cc35c9e00a1f5328da46913c518fefd70f4

    SHA512

    e8ddd6ddd576062decc2855503f5abf2f54ed6bcf69ebd1375431f3e58daed25ac4adf560c73d17954959ee35a74b57207456a698e0000bfb4ca4e4d1cfb551e

  • memory/4576-134-0x0000000000000000-mapping.dmp