Analysis

  • max time kernel
    186s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 22:43

General

  • Target

    67d87a67fd38a462607cb5b37f19d4fe43990ae15127d826c8aab386129a79ff.exe

  • Size

    180KB

  • MD5

    11d8f608eb9c99a631b9806bc117b630

  • SHA1

    dc7f032df7fca28b0eec93c75de1138eb196459a

  • SHA256

    67d87a67fd38a462607cb5b37f19d4fe43990ae15127d826c8aab386129a79ff

  • SHA512

    458a9d5eca1a7561b64709e1970547b3ae252ea3ca35824088da0444526455b48a35f3d5ddf7bc8e78e5748fbf4c22b01c0cae107ada461db2f186d106bed8b9

  • SSDEEP

    3072:6IWiGdYRLoeEdRos/eaqFnqWDb+uTyLDC6s5sSYqGlC6YViZj5HQXZmmJ0yCFio8:VccKPpm2lC6YViZj5HQXZmmJ0yCF9Bx3

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67d87a67fd38a462607cb5b37f19d4fe43990ae15127d826c8aab386129a79ff.exe
    "C:\Users\Admin\AppData\Local\Temp\67d87a67fd38a462607cb5b37f19d4fe43990ae15127d826c8aab386129a79ff.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\roaoz.exe
      "C:\Users\Admin\roaoz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4952

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\roaoz.exe

          Filesize

          180KB

          MD5

          9baf2cfeecc81f4e9289e5d187c0433b

          SHA1

          4d22624441d0b4fb4817460435bd2c29a4729e16

          SHA256

          8a651e97d650f1479b9bfebb9564764a811c51592789bbfd5e9f60abe5b210a3

          SHA512

          14425cbca89cf3f3ca634c277d2002d6ddfd7fd17500f3ce4a6ca35c8e736f6b54a5762fbdb7222f640d5937c82e9f5ea6233c646a36c1bab507654c33a85d04

        • C:\Users\Admin\roaoz.exe

          Filesize

          180KB

          MD5

          9baf2cfeecc81f4e9289e5d187c0433b

          SHA1

          4d22624441d0b4fb4817460435bd2c29a4729e16

          SHA256

          8a651e97d650f1479b9bfebb9564764a811c51592789bbfd5e9f60abe5b210a3

          SHA512

          14425cbca89cf3f3ca634c277d2002d6ddfd7fd17500f3ce4a6ca35c8e736f6b54a5762fbdb7222f640d5937c82e9f5ea6233c646a36c1bab507654c33a85d04