Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 20:48

General

  • Target

    bff071023e763a5568b673ba040e916f214ace6e65e2214b20fcd0678e23f84d.exe

  • Size

    208KB

  • MD5

    645b51f6d90104815825c2495a879090

  • SHA1

    6c19d245c4dae823bdd0bc62941af5fb696ecb5a

  • SHA256

    bff071023e763a5568b673ba040e916f214ace6e65e2214b20fcd0678e23f84d

  • SHA512

    e810f0099647d71d1251115b0d5cdee4d6a5e82ee81576f1cbedeb9504f59798e8811de85c52edb9366630d62888f792ce633cfdbc8402b48000633bf4d7bb72

  • SSDEEP

    3072:UFts3GEAkPRCSk3YRNCgmm/r4o+1EqCzfA1WmdH83qZ0oREdxuDwZe/rPXUv9UtV:EtASCRCm/r4JOmN83GuuuSXUWeK

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bff071023e763a5568b673ba040e916f214ace6e65e2214b20fcd0678e23f84d.exe
    "C:\Users\Admin\AppData\Local\Temp\bff071023e763a5568b673ba040e916f214ace6e65e2214b20fcd0678e23f84d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\boroz.exe
      "C:\Users\Admin\boroz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\boroz.exe

    Filesize

    208KB

    MD5

    52366498fb419ac3c0aba10108401d06

    SHA1

    54f42295cd671c960ef91dfd8344a875db8bccee

    SHA256

    beaddbf0cbe695b4951b8f1a7a4a4aed62fbb5c1862e7c4d6d336cf7c1dd2cda

    SHA512

    177f692044f5efd3f2b53b17579822ab19294c70daa45ece949435692fb727847edd0c6e04cbdc2b3b719465f24d76a4d56c7b729cfc94034325225f6919a6ce

  • C:\Users\Admin\boroz.exe

    Filesize

    208KB

    MD5

    52366498fb419ac3c0aba10108401d06

    SHA1

    54f42295cd671c960ef91dfd8344a875db8bccee

    SHA256

    beaddbf0cbe695b4951b8f1a7a4a4aed62fbb5c1862e7c4d6d336cf7c1dd2cda

    SHA512

    177f692044f5efd3f2b53b17579822ab19294c70daa45ece949435692fb727847edd0c6e04cbdc2b3b719465f24d76a4d56c7b729cfc94034325225f6919a6ce

  • memory/4844-134-0x0000000000000000-mapping.dmp