Analysis

  • max time kernel
    156s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 03:47

General

  • Target

    a04b35d005a520f13e3a66785248ced628ecc41be553ea99b4e6488a63a3c530.exe

  • Size

    244KB

  • MD5

    40b6fe961edcbc4b23c667963dfb0de0

  • SHA1

    98c564bc7df2b89d9714af7b4ed2466f865e787e

  • SHA256

    a04b35d005a520f13e3a66785248ced628ecc41be553ea99b4e6488a63a3c530

  • SHA512

    e81edc3bc3894d9f1b1a272eede506ccf6a67abc0ff1ad579ab7a1399c855585a7d854f5f7abf17e53a06faab74d0e6388919c8a4cd8d0cd5d9c38d32707407e

  • SSDEEP

    3072:w7VlhN1mhvnvyMZeet/8LWCyiHCOXfPjz:gYvyMwNWCyiHC+

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a04b35d005a520f13e3a66785248ced628ecc41be553ea99b4e6488a63a3c530.exe
    "C:\Users\Admin\AppData\Local\Temp\a04b35d005a520f13e3a66785248ced628ecc41be553ea99b4e6488a63a3c530.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Users\Admin\baubiy.exe
      "C:\Users\Admin\baubiy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\baubiy.exe

    Filesize

    244KB

    MD5

    3b03f80df30b78c72d7808257f5c475d

    SHA1

    b545fc0bd01e0bd6d04b6eb9f77d71c35087d95c

    SHA256

    6d38abc713e3b83610024fde2ccee67cd2d5ad770a6b00ad066570da54bad574

    SHA512

    425c804dbffc2ea163f41830dc55fd2eaab780a591108f67cc30ad0748d2741a4509dcd0ed001eee0d7a8bb870f50281d282f52e24b6b78abdfd96edc0e9388a

  • C:\Users\Admin\baubiy.exe

    Filesize

    244KB

    MD5

    3b03f80df30b78c72d7808257f5c475d

    SHA1

    b545fc0bd01e0bd6d04b6eb9f77d71c35087d95c

    SHA256

    6d38abc713e3b83610024fde2ccee67cd2d5ad770a6b00ad066570da54bad574

    SHA512

    425c804dbffc2ea163f41830dc55fd2eaab780a591108f67cc30ad0748d2741a4509dcd0ed001eee0d7a8bb870f50281d282f52e24b6b78abdfd96edc0e9388a