Analysis

  • max time kernel
    173s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2022, 14:04

General

  • Target

    22bd1934052842e96ea5f1b9938f1ec2871059fecd510d6b829a4c612ccdabf5.exe

  • Size

    320KB

  • MD5

    6dd82f18a58f3e3a450c9d5a93f87f90

  • SHA1

    a5b83f4a2dadcbcff62065fbcf9e7b3dc9cf6130

  • SHA256

    22bd1934052842e96ea5f1b9938f1ec2871059fecd510d6b829a4c612ccdabf5

  • SHA512

    8a303fbb888ec33a14211e05a13485bbea4e702289b4cbb649511586478a538294c1f9f09bc7b34b74e199bf650be2692deeef3c10659baef002f7c0c600d36e

  • SSDEEP

    6144:lc+xPxlRGOiHJ66onJGr+qyVztumGS5Ni3hpgoMKMphaeVf2B71L:ljPjRGOi76JGr+qyVztumGS5YqoyU71L

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22bd1934052842e96ea5f1b9938f1ec2871059fecd510d6b829a4c612ccdabf5.exe
    "C:\Users\Admin\AppData\Local\Temp\22bd1934052842e96ea5f1b9938f1ec2871059fecd510d6b829a4c612ccdabf5.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\bnvud.exe
      "C:\Users\Admin\bnvud.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2672

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\bnvud.exe

          Filesize

          320KB

          MD5

          05325e546ea930c1f9057a364199085f

          SHA1

          61d05fd4b792eee17df2b6048f0bcfbaf03f3100

          SHA256

          2029347c7d8b8162fd7ba52d9274a6aa91a90d7c748058e99ac68754064ef701

          SHA512

          5534fb692a5708f9531a92f11915b72810022267e3ea15819b25abad9f4a9659172ff7b7c202e1cc13c2dbf8feeb0a9f834b8e87b29df8a9c55cd5efa26cb9d5

        • C:\Users\Admin\bnvud.exe

          Filesize

          320KB

          MD5

          05325e546ea930c1f9057a364199085f

          SHA1

          61d05fd4b792eee17df2b6048f0bcfbaf03f3100

          SHA256

          2029347c7d8b8162fd7ba52d9274a6aa91a90d7c748058e99ac68754064ef701

          SHA512

          5534fb692a5708f9531a92f11915b72810022267e3ea15819b25abad9f4a9659172ff7b7c202e1cc13c2dbf8feeb0a9f834b8e87b29df8a9c55cd5efa26cb9d5

        • memory/2264-132-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2264-141-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2672-140-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2672-142-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB