Analysis

  • max time kernel
    154s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 01:57

General

  • Target

    34eceb3fcde2a50b7715b79daa06f433bb8794409d9389c1908108d90f65fb58.exe

  • Size

    184KB

  • MD5

    811d1efdadc510bdc1145547569552db

  • SHA1

    14e2c6ef5595a2b49e922ad11b29d4988ac67133

  • SHA256

    34eceb3fcde2a50b7715b79daa06f433bb8794409d9389c1908108d90f65fb58

  • SHA512

    686a9caba66fa85f6652680aa1c9bc2463dc5553d6e019d682bc0f2c40c6d7bebcfe7c250423620bfa8327d15f2d48e808f6324f9cd4e5c9f2ed466c3733eca2

  • SSDEEP

    3072:ZI55BzN9YUdtG716ennADVeMfcRAGKB+uMTEd1CTa:ZiZu1tnADVhERAGKB+uSEdl

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34eceb3fcde2a50b7715b79daa06f433bb8794409d9389c1908108d90f65fb58.exe
    "C:\Users\Admin\AppData\Local\Temp\34eceb3fcde2a50b7715b79daa06f433bb8794409d9389c1908108d90f65fb58.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Users\Admin\wiakuj.exe
      "C:\Users\Admin\wiakuj.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:748

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\wiakuj.exe

          Filesize

          184KB

          MD5

          ce3d9848f4b73e3f9bfc5c425b338777

          SHA1

          5d8bfa2d2289d7f3bd64f86c0a6f4a85868c9c31

          SHA256

          95183a864c08ee1d3cc00295e49541380965007325e4c17230048803dff1e05a

          SHA512

          01c8d426901f612f6542afbabcc53b645fc5d573e97d7f206af9325c0fb1ebcc5299ca0a40dc99b6d26fc290556e83c8897f0df613b61cba2030a8cbb07c9518

        • C:\Users\Admin\wiakuj.exe

          Filesize

          184KB

          MD5

          ce3d9848f4b73e3f9bfc5c425b338777

          SHA1

          5d8bfa2d2289d7f3bd64f86c0a6f4a85868c9c31

          SHA256

          95183a864c08ee1d3cc00295e49541380965007325e4c17230048803dff1e05a

          SHA512

          01c8d426901f612f6542afbabcc53b645fc5d573e97d7f206af9325c0fb1ebcc5299ca0a40dc99b6d26fc290556e83c8897f0df613b61cba2030a8cbb07c9518