Analysis

  • max time kernel
    152s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 01:57

General

  • Target

    c2aea9e81be92de85ebe7ba2bbe1d82ce081a1e82abdd3a0256459e0314f0ea0.exe

  • Size

    240KB

  • MD5

    80ad42b2f8fba68ebc582bdc9c4550a1

  • SHA1

    55900956dd43cc319f117c174f71c3048d7ae283

  • SHA256

    c2aea9e81be92de85ebe7ba2bbe1d82ce081a1e82abdd3a0256459e0314f0ea0

  • SHA512

    836ce55a0661fd3be7b9a12debbbf13fd782d33ba8a88fd2f8dc35822a510965434eb309e55ca482fdd6326e370eea49a9fe3f487f1edc541262ba034bf6bb3b

  • SSDEEP

    3072:UGMUxRW+zbfMjS2BXeWBFcAfqTEBRjefrfRLfN561PHuh0PW6gsR:UPIFD2peScAfA0jCfr567PP

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2aea9e81be92de85ebe7ba2bbe1d82ce081a1e82abdd3a0256459e0314f0ea0.exe
    "C:\Users\Admin\AppData\Local\Temp\c2aea9e81be92de85ebe7ba2bbe1d82ce081a1e82abdd3a0256459e0314f0ea0.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Users\Admin\geuqao.exe
      "C:\Users\Admin\geuqao.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\geuqao.exe

    Filesize

    240KB

    MD5

    e50545c64d256a4ab1edebfb3f2086a4

    SHA1

    8988a2d90f45a60e46cab47b887af45f32fd5fc8

    SHA256

    59e7ff33e58c854e01165bc37c21ed14f4c63e596d3c2ab593995c3aa4553143

    SHA512

    e406c051e79b592aad22a0fb61ea9835495b084e5511518ac87607d589c17522085b752ce31f15ba62d99c0f43c38c2eb32c3499267b753616c9ade9c4096560

  • C:\Users\Admin\geuqao.exe

    Filesize

    240KB

    MD5

    e50545c64d256a4ab1edebfb3f2086a4

    SHA1

    8988a2d90f45a60e46cab47b887af45f32fd5fc8

    SHA256

    59e7ff33e58c854e01165bc37c21ed14f4c63e596d3c2ab593995c3aa4553143

    SHA512

    e406c051e79b592aad22a0fb61ea9835495b084e5511518ac87607d589c17522085b752ce31f15ba62d99c0f43c38c2eb32c3499267b753616c9ade9c4096560