Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 20:35

General

  • Target

    03d34c4159bd693696d2a07e3500efdcf611e69db31123a2012407dfd6408f4a.exe

  • Size

    340KB

  • MD5

    6801f5b3e08daf16f81d76519013f2b7

  • SHA1

    32163f7454de7bca0907f2c6b1ca49b86acdf555

  • SHA256

    03d34c4159bd693696d2a07e3500efdcf611e69db31123a2012407dfd6408f4a

  • SHA512

    ef7dec9da137f702f7f98df69e799e6e8b4cf12107f5ad0cd031039fd095d8bb3600bb3dc8118fa9bbf3eb0f884b207f8251c82d47200d25bc07a57533a29146

  • SSDEEP

    6144:VFPR9SLkWor+akVC5s/durgm7hv8htqiXkIvaX/m7bfTWaUspmHjYT9oFv6wHH/y:b59SLkWor+akVC5s/dIdEhtqiXkIvaX+

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d34c4159bd693696d2a07e3500efdcf611e69db31123a2012407dfd6408f4a.exe
    "C:\Users\Admin\AppData\Local\Temp\03d34c4159bd693696d2a07e3500efdcf611e69db31123a2012407dfd6408f4a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3856
    • C:\Users\Admin\coiut.exe
      "C:\Users\Admin\coiut.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3164

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\coiut.exe

    Filesize

    340KB

    MD5

    e0c27bd488a67fe0f741a83a2789db87

    SHA1

    7297cfe96ad8e5684bbf5c777517f203018f69e4

    SHA256

    f2cb7da64a7f45d844192aa6e22fc55f921a03ccf0f4474b5a9f54234e1e2153

    SHA512

    c0cfff08ccb3f5f5bdb93098d4e0e07f9a5c7d79dbecab8395e58e8ca6fa502cad2900f0f6d15680169a0d89fcd4dc75823b9f6b26608d02b78dcc0d6188d316

  • C:\Users\Admin\coiut.exe

    Filesize

    340KB

    MD5

    e0c27bd488a67fe0f741a83a2789db87

    SHA1

    7297cfe96ad8e5684bbf5c777517f203018f69e4

    SHA256

    f2cb7da64a7f45d844192aa6e22fc55f921a03ccf0f4474b5a9f54234e1e2153

    SHA512

    c0cfff08ccb3f5f5bdb93098d4e0e07f9a5c7d79dbecab8395e58e8ca6fa502cad2900f0f6d15680169a0d89fcd4dc75823b9f6b26608d02b78dcc0d6188d316

  • memory/3164-134-0x0000000000000000-mapping.dmp