Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 02:37

General

  • Target

    e35870964200bea951d46ee108e7ad68679b38eb33fe8067702321a6a454cb4a.exe

  • Size

    144KB

  • MD5

    692a609fe9ac958ffa8e71f3c17a1ad0

  • SHA1

    61b636da21e77e79dd9a7e7a6356e7dffb82d3d6

  • SHA256

    e35870964200bea951d46ee108e7ad68679b38eb33fe8067702321a6a454cb4a

  • SHA512

    1b3ba12f19838e98f03a9a29912fadbc219aa6a04980761b85ec52bc7be37bfc4c915b972ee71f3d6c62ae322ce7dd0bb87faadf2de5f4fa378b76a697b68f59

  • SSDEEP

    1536:BzDuxKPWt3obxUa0G+UAqn2z3HldglfL3wi65IWS9qfmAhjimR:hDMKOtgPplAVelfTWI6fmAFimR

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e35870964200bea951d46ee108e7ad68679b38eb33fe8067702321a6a454cb4a.exe
    "C:\Users\Admin\AppData\Local\Temp\e35870964200bea951d46ee108e7ad68679b38eb33fe8067702321a6a454cb4a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Users\Admin\fpkix.exe
      "C:\Users\Admin\fpkix.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fpkix.exe

    Filesize

    144KB

    MD5

    3bb18650854a8edb4435cb574b7075c2

    SHA1

    9268b18811eaa63042893e4383c7a63c8bcc76d3

    SHA256

    28ade32b06da5917a71d6d88009d1e39365ed3f0e0e97d7e1780a935e639b30d

    SHA512

    2fc25fd11fe10eb7e2317acecef494179d79763e456638ddf3a5849deee6b8393513ff235277224fd6db0837400f84718cfe812c17e5559e6ac2d2f37263f5cd

  • C:\Users\Admin\fpkix.exe

    Filesize

    144KB

    MD5

    3bb18650854a8edb4435cb574b7075c2

    SHA1

    9268b18811eaa63042893e4383c7a63c8bcc76d3

    SHA256

    28ade32b06da5917a71d6d88009d1e39365ed3f0e0e97d7e1780a935e639b30d

    SHA512

    2fc25fd11fe10eb7e2317acecef494179d79763e456638ddf3a5849deee6b8393513ff235277224fd6db0837400f84718cfe812c17e5559e6ac2d2f37263f5cd