Analysis

  • max time kernel
    154s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 22:42

General

  • Target

    e2276dd1260203af793fb7b16dd757b4de6fe54b277d19a29e15bc641d78004f.exe

  • Size

    208KB

  • MD5

    722eaa35562e64955d9694434736c8b2

  • SHA1

    706a63afe7e101ce6ba7244bada2ee3e02640a22

  • SHA256

    e2276dd1260203af793fb7b16dd757b4de6fe54b277d19a29e15bc641d78004f

  • SHA512

    5c090eb43ade4b321b4590fe7e81b2ad594d47a7a70d247e6384ff3f84269d165be9dda0845e8cba78d06df0f05a251c90cf3a3fc7ed484ecb3869bba36f71cf

  • SSDEEP

    6144:0oDuWZrQ+ONFDTIvgte8R2rHFllXgDMWd65QXoHqxVDTG/r1pAa+/mf2X+AxD1:0oaWZrQ+ONFDTIvgte8R2rHFllXgDMWr

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2276dd1260203af793fb7b16dd757b4de6fe54b277d19a29e15bc641d78004f.exe
    "C:\Users\Admin\AppData\Local\Temp\e2276dd1260203af793fb7b16dd757b4de6fe54b277d19a29e15bc641d78004f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Users\Admin\naixei.exe
      "C:\Users\Admin\naixei.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1676

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\naixei.exe

          Filesize

          208KB

          MD5

          398dca85ad94b7d38b5b0c9fcfbb6266

          SHA1

          09137e4ccc173fa25139066a0c6431d261cd22d4

          SHA256

          e59c59664fb0f3764f11752370d672d6fe37937741951154c7f98398ace30bdb

          SHA512

          83979df71d6eae11605446624ce103aa19d9f197518ce6db6cd55839bbd28aacc19b25d1932bc5c40508fefe38b38d43a0383609fa3c481bccaaef8d5c357412

        • C:\Users\Admin\naixei.exe

          Filesize

          208KB

          MD5

          398dca85ad94b7d38b5b0c9fcfbb6266

          SHA1

          09137e4ccc173fa25139066a0c6431d261cd22d4

          SHA256

          e59c59664fb0f3764f11752370d672d6fe37937741951154c7f98398ace30bdb

          SHA512

          83979df71d6eae11605446624ce103aa19d9f197518ce6db6cd55839bbd28aacc19b25d1932bc5c40508fefe38b38d43a0383609fa3c481bccaaef8d5c357412