Analysis

  • max time kernel
    158s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 04:06

General

  • Target

    7a1a4777593adcaf6161692c5dbd6377a2aec91fa58f5fadaa94d3750deee685.exe

  • Size

    280KB

  • MD5

    381dddd3de8c9ccc3823f3a027892baf

  • SHA1

    af17f2d0a0bf904ae2e61559423939ce2054edf6

  • SHA256

    7a1a4777593adcaf6161692c5dbd6377a2aec91fa58f5fadaa94d3750deee685

  • SHA512

    7922151b4ce9ef41d1c101d564b52e0a7f60184ca49d82facf2a669eeefea0f56487422369b33f766b6e439e1ac4362fd8fb7020b5242ede625292b411aafd8e

  • SSDEEP

    3072:zarriHOPiu8aQb3TqDUCiGjHJDbRv9y+qwa+rZf/MegBX:SriHOq3TqD+0HBb5ta+rZ3MT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a1a4777593adcaf6161692c5dbd6377a2aec91fa58f5fadaa94d3750deee685.exe
    "C:\Users\Admin\AppData\Local\Temp\7a1a4777593adcaf6161692c5dbd6377a2aec91fa58f5fadaa94d3750deee685.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3788
    • C:\Users\Admin\biogiq.exe
      "C:\Users\Admin\biogiq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\biogiq.exe

    Filesize

    280KB

    MD5

    80c5abaa74ba6cc7898c83c84c921013

    SHA1

    9c41e466821922a452ee0b1f12c2cb48d7d2f1d6

    SHA256

    1e71f1b1200e1c1af215b797ff9696bbc39339fd2660fef7d3175f1b7a299f16

    SHA512

    f96821c2b1316f4b6e2cc5d9f3734b93517c9d75b606d522c69ad5e7b83679c892534de1d5f8d6afc8f2066ddce65e5da2beda1f1a668ff712d37a1d1bae84c8

  • C:\Users\Admin\biogiq.exe

    Filesize

    280KB

    MD5

    80c5abaa74ba6cc7898c83c84c921013

    SHA1

    9c41e466821922a452ee0b1f12c2cb48d7d2f1d6

    SHA256

    1e71f1b1200e1c1af215b797ff9696bbc39339fd2660fef7d3175f1b7a299f16

    SHA512

    f96821c2b1316f4b6e2cc5d9f3734b93517c9d75b606d522c69ad5e7b83679c892534de1d5f8d6afc8f2066ddce65e5da2beda1f1a668ff712d37a1d1bae84c8