Analysis

  • max time kernel
    136s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 04:10

General

  • Target

    d871321fde2442f8892a78f3287234eefd5f6f2176aec7f5048664546791b481.exe

  • Size

    184KB

  • MD5

    41c86185b7ba28e9613e7d39ad9f7a93

  • SHA1

    b41a5ed0d3f118e0256b784896797479c968a0d6

  • SHA256

    d871321fde2442f8892a78f3287234eefd5f6f2176aec7f5048664546791b481

  • SHA512

    8d7609e889bf63230e9424d14c60ad455748dcd41176cc8a91c3baf4c9d19a98ff0577f4f2e46c3a791c26913bf48cf5a554b2487567381fbde940e68c0ff29a

  • SSDEEP

    3072:PPpo6364Gv8F+7+w3wrOwo9aXw9Nf6b2fG+b6:PPpoO6p3f6jH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d871321fde2442f8892a78f3287234eefd5f6f2176aec7f5048664546791b481.exe
    "C:\Users\Admin\AppData\Local\Temp\d871321fde2442f8892a78f3287234eefd5f6f2176aec7f5048664546791b481.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Users\Admin\weeyiaj.exe
      "C:\Users\Admin\weeyiaj.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\weeyiaj.exe

    Filesize

    184KB

    MD5

    51df40368102149df0df08d6a564684d

    SHA1

    9d0a52670489b78deaa94f476f759ff1102a9067

    SHA256

    40629315e3a1b6cf93d181b447811adbeb6de1419c24a1c03a5120527cc4a4ab

    SHA512

    aa483cac77d0e3f2c4e2eb226ffe8413115affff2b8f41345c14d606faaee0cbf3cf077538988748801bddba3e6eb61361ec89916a785339e637d51d9f2922b6

  • C:\Users\Admin\weeyiaj.exe

    Filesize

    184KB

    MD5

    51df40368102149df0df08d6a564684d

    SHA1

    9d0a52670489b78deaa94f476f759ff1102a9067

    SHA256

    40629315e3a1b6cf93d181b447811adbeb6de1419c24a1c03a5120527cc4a4ab

    SHA512

    aa483cac77d0e3f2c4e2eb226ffe8413115affff2b8f41345c14d606faaee0cbf3cf077538988748801bddba3e6eb61361ec89916a785339e637d51d9f2922b6