Analysis

  • max time kernel
    177s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2022, 10:18

General

  • Target

    b31c4c8856197e93ae2456ac30aff3bf56c110dafcbb61773695f55219e5ec69.exe

  • Size

    208KB

  • MD5

    73a477cf341398696e96ec64a33c3d1e

  • SHA1

    8427cef6f1b10564f3dddf637df628efd92e42f5

  • SHA256

    b31c4c8856197e93ae2456ac30aff3bf56c110dafcbb61773695f55219e5ec69

  • SHA512

    53d6bdced3865b73fcb112a484fcf49aae25a07d2fb596811810f75855f77a391e42930729891a058be605b1881493e9300defc3e67e6a05768eec06d99a9512

  • SSDEEP

    6144:9ooseuQmToYfPeffkxsthVIVO+b/RnmbT4PW9UmE7ldESgvSAOugwq:9DuQmToYfPeffkxsthVIVO+b/9mbkPW6

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b31c4c8856197e93ae2456ac30aff3bf56c110dafcbb61773695f55219e5ec69.exe
    "C:\Users\Admin\AppData\Local\Temp\b31c4c8856197e93ae2456ac30aff3bf56c110dafcbb61773695f55219e5ec69.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Users\Admin\muusen.exe
      "C:\Users\Admin\muusen.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\muusen.exe

    Filesize

    208KB

    MD5

    9c44ee448274922f2e7bc1b0b5f0a849

    SHA1

    5f1427f282bd965ff54b2686f410bca02429ce84

    SHA256

    d27e64db99c8101aff33800bc0956f1d301818131dd54d5a61203778a0f71b51

    SHA512

    4b228950610559fbcda8fcc802ef2ed54b7f228313bc181555c42a3ff46d1055f682891d6c28119fa94f43435d680c35b34374ff5eefccb6c57090113e1154c8

  • C:\Users\Admin\muusen.exe

    Filesize

    208KB

    MD5

    9c44ee448274922f2e7bc1b0b5f0a849

    SHA1

    5f1427f282bd965ff54b2686f410bca02429ce84

    SHA256

    d27e64db99c8101aff33800bc0956f1d301818131dd54d5a61203778a0f71b51

    SHA512

    4b228950610559fbcda8fcc802ef2ed54b7f228313bc181555c42a3ff46d1055f682891d6c28119fa94f43435d680c35b34374ff5eefccb6c57090113e1154c8