Analysis

  • max time kernel
    209s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 22:38

General

  • Target

    aff3b7f3bc1437850ee6fe58485fc13029345116b0b3cbc1947017745629d41b.exe

  • Size

    292KB

  • MD5

    29911e0aa62129c01efa95e0d54f27d2

  • SHA1

    6daddc9b3dc7a3d1e2fe7d29af3dc3bbb1c5da24

  • SHA256

    aff3b7f3bc1437850ee6fe58485fc13029345116b0b3cbc1947017745629d41b

  • SHA512

    0ea4fc90df83394b98ce1c39ab7936e919c439d2b338601da839f4057fb8081f31d13228459dc7b51995ccd9e8b235371fd649ae15556515b370759989cdab4e

  • SSDEEP

    6144:9nn5VDiBomrw0XFnXXQYmRZEcm3ROI4lStQaiSaWjUuts:N5oCmrn1nXXQYuZEcm3ROI4lStQaiSa/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aff3b7f3bc1437850ee6fe58485fc13029345116b0b3cbc1947017745629d41b.exe
    "C:\Users\Admin\AppData\Local\Temp\aff3b7f3bc1437850ee6fe58485fc13029345116b0b3cbc1947017745629d41b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\keuece.exe
      "C:\Users\Admin\keuece.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\keuece.exe

    Filesize

    292KB

    MD5

    22753b4d1140f2bbe37ea2faf9823fe2

    SHA1

    ec3642c5f02c8f9d2fb065ca12f38e032f4791be

    SHA256

    d4fa890c28284eb7013eb40defa5dd47a7cadf8cb5dfb9e9be67dcffaf14a1cf

    SHA512

    fe27259811abc4724d362bcac39d1ca415418d143049fc07acbb65695a3dc98f2fdc6adee83dd45465a0ea5bed474b475e5bf4a00c912a923464ee45b8cfc30c

  • C:\Users\Admin\keuece.exe

    Filesize

    292KB

    MD5

    22753b4d1140f2bbe37ea2faf9823fe2

    SHA1

    ec3642c5f02c8f9d2fb065ca12f38e032f4791be

    SHA256

    d4fa890c28284eb7013eb40defa5dd47a7cadf8cb5dfb9e9be67dcffaf14a1cf

    SHA512

    fe27259811abc4724d362bcac39d1ca415418d143049fc07acbb65695a3dc98f2fdc6adee83dd45465a0ea5bed474b475e5bf4a00c912a923464ee45b8cfc30c