Analysis

  • max time kernel
    153s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 01:35

General

  • Target

    ab85473efa31b3380674057296aff410bac4313de690ed4d965fdc8167bc87be.exe

  • Size

    124KB

  • MD5

    68a83e7b25332564030d2fd30b14ae20

  • SHA1

    bf550cd9fc313723ccebf5e2a9dc1e8dd7557342

  • SHA256

    ab85473efa31b3380674057296aff410bac4313de690ed4d965fdc8167bc87be

  • SHA512

    79b6abb219c11006264238228b6e39bc2fd9e87ce5056112560cc01003494810d5fed5bfffd9fedde8c5bf87281ce4af75ea08db428ed0ee618e0618231bedb8

  • SSDEEP

    1536:50ceYl02OnF7qnJiq6H48O6j6/t66366Z6Jz36k6eA66KD6sqG/Oji6FA8HxAH6C:GZD2OnF7qJS3e50wMZZZZWMkIJ26

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab85473efa31b3380674057296aff410bac4313de690ed4d965fdc8167bc87be.exe
    "C:\Users\Admin\AppData\Local\Temp\ab85473efa31b3380674057296aff410bac4313de690ed4d965fdc8167bc87be.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3252
    • C:\Users\Admin\quduv.exe
      "C:\Users\Admin\quduv.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4400

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\quduv.exe

          Filesize

          124KB

          MD5

          c2e35271e634cc04fd453d73c13cb07d

          SHA1

          63cf707ea7214f351e689a3e6b2c2c26a12e8ecc

          SHA256

          40000b4981ecee9cb8d006e5899286780a507517fd4e5865f1ee4915ce1f115f

          SHA512

          43e326ef91a1fb968986a626bc1935bcbf299b51298de0779f56e16d1bb6b8eb74b37976fe4e310f54131ff0214f1bbef01cbc5f950fe652e374b2233e489b2a

        • C:\Users\Admin\quduv.exe

          Filesize

          124KB

          MD5

          c2e35271e634cc04fd453d73c13cb07d

          SHA1

          63cf707ea7214f351e689a3e6b2c2c26a12e8ecc

          SHA256

          40000b4981ecee9cb8d006e5899286780a507517fd4e5865f1ee4915ce1f115f

          SHA512

          43e326ef91a1fb968986a626bc1935bcbf299b51298de0779f56e16d1bb6b8eb74b37976fe4e310f54131ff0214f1bbef01cbc5f950fe652e374b2233e489b2a