Analysis

  • max time kernel
    150s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 22:11

General

  • Target

    1e4f75cfcef77d0df6da0427649af40f19ded23044af80113c59746283475306.exe

  • Size

    88KB

  • MD5

    40e359cc1a7a12f607856e59bee59510

  • SHA1

    086f7f1611c94878e546160bb54c4dd22f8080a4

  • SHA256

    1e4f75cfcef77d0df6da0427649af40f19ded23044af80113c59746283475306

  • SHA512

    41c23d42dbbc20dc4f4643cdf691b81e020cad5c28ca97f2eb0ade470d448522bfbf3166046d06eb929235ec5e07bb53f621f004cf3da656ea381ff70426db4b

  • SSDEEP

    768:SEb6o58+nURLQ/JD60XDeVtA5YxmHwWW2iYf/ce2NZQcyfbdg5CIBT/DCwaTDNmx:S+8+IQ/JDHKa5LJW6/Z2NZQCvDmNmopA

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e4f75cfcef77d0df6da0427649af40f19ded23044af80113c59746283475306.exe
    "C:\Users\Admin\AppData\Local\Temp\1e4f75cfcef77d0df6da0427649af40f19ded23044af80113c59746283475306.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Users\Admin\tfkiq.exe
      "C:\Users\Admin\tfkiq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tfkiq.exe

    Filesize

    88KB

    MD5

    49cbdf58f1c1fa59b82437f5ffe05e14

    SHA1

    1adb42a3c31d5c1fbb2b0865d0ae6b04a355bdb0

    SHA256

    c37330fc641c83b103d18615f56320fcb592c800ef0cfb723f59e2c453252d1e

    SHA512

    448867f5ed0dc621b62f5cb2d8300899d071513ec6662d315ee3c784011f62782092f3eccf021b3462ab5c26797eb6f3132f7283eb42098dc38d0fa2b430f7c5

  • C:\Users\Admin\tfkiq.exe

    Filesize

    88KB

    MD5

    49cbdf58f1c1fa59b82437f5ffe05e14

    SHA1

    1adb42a3c31d5c1fbb2b0865d0ae6b04a355bdb0

    SHA256

    c37330fc641c83b103d18615f56320fcb592c800ef0cfb723f59e2c453252d1e

    SHA512

    448867f5ed0dc621b62f5cb2d8300899d071513ec6662d315ee3c784011f62782092f3eccf021b3462ab5c26797eb6f3132f7283eb42098dc38d0fa2b430f7c5

  • memory/5108-134-0x0000000000000000-mapping.dmp