Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe
Resource
win10v2004-20220812-en
General
-
Target
e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe
-
Size
240KB
-
MD5
968787857bcd20ad61b6b1d9136a353e
-
SHA1
a3f581eba23ce9c688e4a5e21a565b485f9ecd5e
-
SHA256
e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b
-
SHA512
9648f64d853fe56dbeb977868ec422f6949775713b456cc43d72bc1f0f3e404e3c8d94073ff73c9fadf6b22878befeffc52633ef18720b7b8682a9c6090b8088
-
SSDEEP
6144:jUv3dwqsNwemAB0EqxF6snji81RUinKchhy9SE:KdQQJsEE
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geoep.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 geoep.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /h" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /t" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /a" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /n" geoep.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /x" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /p" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /f" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /f" e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /c" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /d" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /e" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /l" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /g" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /m" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /b" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /o" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /j" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /z" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /i" geoep.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /r" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /v" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /q" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /u" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /k" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /s" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /w" geoep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoep = "C:\\Users\\Admin\\geoep.exe /y" geoep.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 660 e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe 660 e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe 2084 geoep.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 660 e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe 2084 geoep.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 660 wrote to memory of 2084 660 e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe 85 PID 660 wrote to memory of 2084 660 e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe 85 PID 660 wrote to memory of 2084 660 e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe"C:\Users\Admin\AppData\Local\Temp\e085d8c6588f36c5be131aa0524e14d76eec0eef9ea87bdbdeaa8b08f5f14d8b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\geoep.exe"C:\Users\Admin\geoep.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5407c202a1a296325a451d081a7f87046
SHA1dd6170cb7136fe7b8056bbf1e76b8738bbffa107
SHA2563f59f4dd3ea550c3be2b356199be156d67338523d1a0b64d610e6b1ef92617b5
SHA5123cee292ecb3c78d6124bb973fdc66c3d7141bf1c8dddbcb592439499fef80242fd843ca3be9741cf4c736976f5d91185eb901fa135c47a35f2e0999836da756f
-
Filesize
240KB
MD5407c202a1a296325a451d081a7f87046
SHA1dd6170cb7136fe7b8056bbf1e76b8738bbffa107
SHA2563f59f4dd3ea550c3be2b356199be156d67338523d1a0b64d610e6b1ef92617b5
SHA5123cee292ecb3c78d6124bb973fdc66c3d7141bf1c8dddbcb592439499fef80242fd843ca3be9741cf4c736976f5d91185eb901fa135c47a35f2e0999836da756f