Analysis

  • max time kernel
    152s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2022 10:15

General

  • Target

    79185e03c6c3ae5a2de42e96a4f9458761e093ae4a21c6a59e0c7fe2340f3f1f.exe

  • Size

    108KB

  • MD5

    68ce83a99796f379209b4f12e72e3bde

  • SHA1

    26521cba4561702867f70a633a7415133d430ede

  • SHA256

    79185e03c6c3ae5a2de42e96a4f9458761e093ae4a21c6a59e0c7fe2340f3f1f

  • SHA512

    e3203ab14321fc4099989efebd405c187265a7ee1689357fc99d27c544efb425447b5f4f4ed487d78a1fb045a955177fb9dcdfb55331e76717fd2a77263a3c96

  • SSDEEP

    1536:gXq8iAuismywsTQLw0wF9MGM9K/oKtNgCMbA1bL3N+NM5UfRvNIjnZjU:zTQ/KLOM52vCnh

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79185e03c6c3ae5a2de42e96a4f9458761e093ae4a21c6a59e0c7fe2340f3f1f.exe
    "C:\Users\Admin\AppData\Local\Temp\79185e03c6c3ae5a2de42e96a4f9458761e093ae4a21c6a59e0c7fe2340f3f1f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\paeihan.exe
      "C:\Users\Admin\paeihan.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\paeihan.exe

    Filesize

    108KB

    MD5

    23df2b6f9b50280917cadff7ad489ff9

    SHA1

    dc861b1caa15888e28b3f21bb9cd63250c246c99

    SHA256

    3350b373bb2574b2f2972e7abfc55d52a1f1d417cda8cf1d9273a1998d85c66f

    SHA512

    0ec21176245d0ea6f287dd34fdc7637d6a6356ecbaafe62251bef61ea2cc944a0ad8f7dabe3001742f8d334d919e56f4afa4b951986e3b4401b59df1abd92ba8

  • C:\Users\Admin\paeihan.exe

    Filesize

    108KB

    MD5

    23df2b6f9b50280917cadff7ad489ff9

    SHA1

    dc861b1caa15888e28b3f21bb9cd63250c246c99

    SHA256

    3350b373bb2574b2f2972e7abfc55d52a1f1d417cda8cf1d9273a1998d85c66f

    SHA512

    0ec21176245d0ea6f287dd34fdc7637d6a6356ecbaafe62251bef61ea2cc944a0ad8f7dabe3001742f8d334d919e56f4afa4b951986e3b4401b59df1abd92ba8

  • memory/2240-132-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2240-141-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4800-140-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4800-142-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB