Analysis

  • max time kernel
    156s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2022, 14:06

General

  • Target

    b062ec3ca6e29c9be7eb6833f8c43f9708e3ed1c12d187db50fce851784c6a18.exe

  • Size

    136KB

  • MD5

    650f499335fc55ad52afd9965f12be60

  • SHA1

    fa4a3412bf45260ecadaf1e4211c246a9082080e

  • SHA256

    b062ec3ca6e29c9be7eb6833f8c43f9708e3ed1c12d187db50fce851784c6a18

  • SHA512

    53820aa7d089d7442da0f5435c613cdfb12c626d3e4ba3aec44840f8fa614c3bff5ec552e13cd737c27ec9fd975223d1e7923bc5bb174afb2223568da455c160

  • SSDEEP

    3072:BmagNwjBfQn7WbIqH0ybZBiOllyEmcP82+aVdOt66VGegmb:BmjYQn7WbIqH0ybZBiOllyE5D+aVkjse

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b062ec3ca6e29c9be7eb6833f8c43f9708e3ed1c12d187db50fce851784c6a18.exe
    "C:\Users\Admin\AppData\Local\Temp\b062ec3ca6e29c9be7eb6833f8c43f9708e3ed1c12d187db50fce851784c6a18.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\caeoga.exe
      "C:\Users\Admin\caeoga.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1740

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\caeoga.exe

          Filesize

          136KB

          MD5

          f2b977b73fb41616718164589ab33140

          SHA1

          ce9d8f2b7f3cfbac726c1252ab79de7ea28ead4c

          SHA256

          f17f0de2a350783b174c74ebd5abde9c5a90b3a36dd74b5e057a9716315f6b63

          SHA512

          9df487978d5f5cf6f408777e5ca5f0676cee8f412fb84de3f247c53156a66f63cea23355e19cb2d5c2f8c2438929c36a6dbb8a5f20ab4a1069d40ba489bbf402

        • C:\Users\Admin\caeoga.exe

          Filesize

          136KB

          MD5

          f2b977b73fb41616718164589ab33140

          SHA1

          ce9d8f2b7f3cfbac726c1252ab79de7ea28ead4c

          SHA256

          f17f0de2a350783b174c74ebd5abde9c5a90b3a36dd74b5e057a9716315f6b63

          SHA512

          9df487978d5f5cf6f408777e5ca5f0676cee8f412fb84de3f247c53156a66f63cea23355e19cb2d5c2f8c2438929c36a6dbb8a5f20ab4a1069d40ba489bbf402