Analysis

  • max time kernel
    179s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 04:09

General

  • Target

    4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe

  • Size

    176KB

  • MD5

    539f498151d2af7958ac8e1d7948b310

  • SHA1

    aea8db48815331522bfe58902bbe1022fba7ec69

  • SHA256

    4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880

  • SHA512

    a6dd7c5ac33ef723c77e6e27cbad28067dea50ada01d9c14920088d75af8b3fd28b7c6d3cdde4ff689b51abd1ffacaf56f06587d0b510661b7b33dd07a4402f9

  • SSDEEP

    3072:QC1IrOI+gj2HsfyKnvmb7/D26zjlBvWlzPpsPfIQ8sqLELTS55pMzcUK1eUyGeX:fI+1Knvmb7/D26zjlBvWhPpsPfIQ8sq0

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe
    "C:\Users\Admin\AppData\Local\Temp\4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Users\Admin\lcjieq.exe
      "C:\Users\Admin\lcjieq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3104

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\lcjieq.exe

          Filesize

          176KB

          MD5

          0ccc27648d2b67ca52b0c2057a3f4fee

          SHA1

          2ca8f2bf10133cf8d2d5947bdc8bd5cb64e030c7

          SHA256

          7019f47b4ac98f090484ff20e04827a0b43c9ba7c0f5135da09b41ac20c41514

          SHA512

          7ea1111a66c52a2ac31120a2ff20a31603739c798f55c650d7e0cbd327ac815f2e53582498e1578cae5e7a9dc428d233ffd7162a5f21311003cc0bc69bc8a734

        • C:\Users\Admin\lcjieq.exe

          Filesize

          176KB

          MD5

          0ccc27648d2b67ca52b0c2057a3f4fee

          SHA1

          2ca8f2bf10133cf8d2d5947bdc8bd5cb64e030c7

          SHA256

          7019f47b4ac98f090484ff20e04827a0b43c9ba7c0f5135da09b41ac20c41514

          SHA512

          7ea1111a66c52a2ac31120a2ff20a31603739c798f55c650d7e0cbd327ac815f2e53582498e1578cae5e7a9dc428d233ffd7162a5f21311003cc0bc69bc8a734