Analysis

  • max time kernel
    152s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 07:47

General

  • Target

    5135d1b17a6cd39214038cb098e9bab090ece866f75ce7c2839fdcf00f2e74cb.exe

  • Size

    504KB

  • MD5

    6afe941c6ac3443fc98b33d786ba0548

  • SHA1

    4c6d722a95f001a237880d54790616884ebf326a

  • SHA256

    5135d1b17a6cd39214038cb098e9bab090ece866f75ce7c2839fdcf00f2e74cb

  • SHA512

    00637db5804e1d28c8e262277bead5970b2e73ff6fce5ac55287f64c54974734de7df7e3530b59ead6eface557de5020395d13028f8ac676dd87a650f0304d29

  • SSDEEP

    6144:syvhitdjyuhy/uqIVwMpIndxyD0w5GziWmdS1CeoiC2DZnlDRXpm1deeC+wDm8:syod25uBWibpkCeBNNuRC+gm8

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5135d1b17a6cd39214038cb098e9bab090ece866f75ce7c2839fdcf00f2e74cb.exe
    "C:\Users\Admin\AppData\Local\Temp\5135d1b17a6cd39214038cb098e9bab090ece866f75ce7c2839fdcf00f2e74cb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Users\Admin\Y4u5h60580.exe
      Y4u5h60580.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Users\Admin\xuaerur.exe
        "C:\Users\Admin\xuaerur.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:220
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del Y4u5h60580.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3776
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:1396
    • C:\Users\Admin\zog.exe
      zog.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\explorer.exe
        000001D4*
        3⤵
          PID:1456
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1456 -s 120
            4⤵
            • Program crash
            PID:3696
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del 5135d1b17a6cd39214038cb098e9bab090ece866f75ce7c2839fdcf00f2e74cb.exe
        2⤵
          PID:556
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 444 -p 1456 -ip 1456
        1⤵
          PID:1844

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Y4u5h60580.exe

          Filesize

          156KB

          MD5

          9f8c7135656944d1f44898bcccd861c2

          SHA1

          bad42bc8dad10a21bfdacc596a3815db0b69a175

          SHA256

          a4dfaa76c783983bffea99b8c8a108b32dd469ae51f4277f9381b79d2dcd9bfd

          SHA512

          2f2ed402480fa06ba520e3192b31354dd5bbf2557f85aa69370c54b22fb6a0888ef08240190ec975cc73a4266a45af9ba564b3be7b70dc167d3cd95e523b16d5

        • C:\Users\Admin\Y4u5h60580.exe

          Filesize

          156KB

          MD5

          9f8c7135656944d1f44898bcccd861c2

          SHA1

          bad42bc8dad10a21bfdacc596a3815db0b69a175

          SHA256

          a4dfaa76c783983bffea99b8c8a108b32dd469ae51f4277f9381b79d2dcd9bfd

          SHA512

          2f2ed402480fa06ba520e3192b31354dd5bbf2557f85aa69370c54b22fb6a0888ef08240190ec975cc73a4266a45af9ba564b3be7b70dc167d3cd95e523b16d5

        • C:\Users\Admin\xuaerur.exe

          Filesize

          156KB

          MD5

          cfe1d0bd61d926b430302d42aef7a536

          SHA1

          c5466879d6890bdd9479934ce018f40f8bbefa72

          SHA256

          d9955ff7143e2d997902bd3694c9d4cbf386445f7198d65cf1ff40a514473936

          SHA512

          35a4eb0cfe09cd52ec23c41ec781c59107d46e6da3aeabe269bd1d8417945cadefad76f5437925516732fc2da9d4d730a5b56cd36a8b5e6466ad8f1d5f6b4a08

        • C:\Users\Admin\xuaerur.exe

          Filesize

          156KB

          MD5

          cfe1d0bd61d926b430302d42aef7a536

          SHA1

          c5466879d6890bdd9479934ce018f40f8bbefa72

          SHA256

          d9955ff7143e2d997902bd3694c9d4cbf386445f7198d65cf1ff40a514473936

          SHA512

          35a4eb0cfe09cd52ec23c41ec781c59107d46e6da3aeabe269bd1d8417945cadefad76f5437925516732fc2da9d4d730a5b56cd36a8b5e6466ad8f1d5f6b4a08

        • C:\Users\Admin\zog.exe

          Filesize

          181KB

          MD5

          139c3fc0dbda75248805ed1a0d41d44a

          SHA1

          2d789ae79753aae0afd544c419029fd6129a1d29

          SHA256

          28da5c2be3b507a8d6c0edc0bbf345c7521d4834c351bd6ab6d2d0778fb24bac

          SHA512

          8d1f286913ee93212104f9032d3ed501d20f85c94e191ff5a0bc6c168d114aad9a8e5d2ee8fd36042a6d3b00c4236c8abe75db5761e2a632f7600969e5f81520

        • C:\Users\Admin\zog.exe

          Filesize

          181KB

          MD5

          139c3fc0dbda75248805ed1a0d41d44a

          SHA1

          2d789ae79753aae0afd544c419029fd6129a1d29

          SHA256

          28da5c2be3b507a8d6c0edc0bbf345c7521d4834c351bd6ab6d2d0778fb24bac

          SHA512

          8d1f286913ee93212104f9032d3ed501d20f85c94e191ff5a0bc6c168d114aad9a8e5d2ee8fd36042a6d3b00c4236c8abe75db5761e2a632f7600969e5f81520

        • memory/1456-143-0x0000000000970000-0x0000000000985000-memory.dmp

          Filesize

          84KB

        • memory/2736-139-0x00000000008F0000-0x000000000094E000-memory.dmp

          Filesize

          376KB

        • memory/2736-142-0x00000000008F0000-0x000000000094E000-memory.dmp

          Filesize

          376KB

        • memory/2736-141-0x0000000000400000-0x000000000045E000-memory.dmp

          Filesize

          376KB