Analysis

  • max time kernel
    152s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 16:28

General

  • Target

    f0fb72340acf199b5fff2327ba5ad04e1d15fab364e3c09cfd2fdc7a66144893.exe

  • Size

    152KB

  • MD5

    61fd5bcd58cc9d99a593f65e58226be5

  • SHA1

    52fc6bd756e3adb70c7b69e60951122b7c3191cc

  • SHA256

    f0fb72340acf199b5fff2327ba5ad04e1d15fab364e3c09cfd2fdc7a66144893

  • SHA512

    0029378465c2b01789f544ae09a20a75b82822fd91e663f0e80ba2598481f7e1c4fbe0f16abc7974e580fc2c0fd5bc488ce472c2438a7150e01f035a3e3f5648

  • SSDEEP

    3072:ptDgFmCmeGMS6WLI3kTB58hahpkzFhPAOJ0NAW/pe4oQZiEbU:kRmeGMS6Wc3kn9ADPAOJ0NJUW+

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0fb72340acf199b5fff2327ba5ad04e1d15fab364e3c09cfd2fdc7a66144893.exe
    "C:\Users\Admin\AppData\Local\Temp\f0fb72340acf199b5fff2327ba5ad04e1d15fab364e3c09cfd2fdc7a66144893.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Users\Admin\piedia.exe
      "C:\Users\Admin\piedia.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\piedia.exe

    Filesize

    152KB

    MD5

    53a201d63c4c52de363bce0f69a62123

    SHA1

    fb323585bd49c1e0ceaa87da12e800102bf0fbd6

    SHA256

    43b6119028b53ea0a9408b02edd8fcb803432044588a96fa2dc389b20d6bbe7b

    SHA512

    87d83063bce5f8659cb13fa46777a61623f0c2d7a13e4962fec824e85d06b8b202c6e4d8035bd65d8f61822227a911f0d3248c8a4fc0a531a52dd84fc1484d03

  • C:\Users\Admin\piedia.exe

    Filesize

    152KB

    MD5

    53a201d63c4c52de363bce0f69a62123

    SHA1

    fb323585bd49c1e0ceaa87da12e800102bf0fbd6

    SHA256

    43b6119028b53ea0a9408b02edd8fcb803432044588a96fa2dc389b20d6bbe7b

    SHA512

    87d83063bce5f8659cb13fa46777a61623f0c2d7a13e4962fec824e85d06b8b202c6e4d8035bd65d8f61822227a911f0d3248c8a4fc0a531a52dd84fc1484d03