Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 10:16

General

  • Target

    df38c880b1b23b9159ad155a964603c627c779e3574805c216eaad1d9223089c.exe

  • Size

    232KB

  • MD5

    96a38593ebeaa8626ec158c8080b9019

  • SHA1

    7ba1cb02ae2051f2831c6b188bcb0928e84869a5

  • SHA256

    df38c880b1b23b9159ad155a964603c627c779e3574805c216eaad1d9223089c

  • SHA512

    2d24d659a23d7f733c797100016d47850028a7fe5b1e562f800a6237725fd8bd981c76eb494f99a375c6776e52fe4bdbb57bae4ca0691d4ad45201dc9a1a213a

  • SSDEEP

    3072:GtAKE9tF8lsa+QWYCs5fDF4LJSImbV8UvR77D9G5UEDVR/bwutUqQJ8tIq:G0tnQzbF4NN28UJ77hGGED/bbJtF

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df38c880b1b23b9159ad155a964603c627c779e3574805c216eaad1d9223089c.exe
    "C:\Users\Admin\AppData\Local\Temp\df38c880b1b23b9159ad155a964603c627c779e3574805c216eaad1d9223089c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Users\Admin\qeifua.exe
      "C:\Users\Admin\qeifua.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3716

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qeifua.exe

          Filesize

          232KB

          MD5

          b4bc745b6f0bff977f8ad3aa7c3bf39f

          SHA1

          46d70e756a992b3c722ea469b703d5e550013050

          SHA256

          82bffe3aefe8727220d77d23104bdf2bd7aea51a54dc5df6881ce04f0c2c33d9

          SHA512

          fce08601699054ad77a31df0575e3dcb178acbb7eaac181a5ec8fcedf19664601c1f1a0be28fee23fb6c0ed5797bb6a8f1a649c764ebcb44e330ddae425d147c

        • C:\Users\Admin\qeifua.exe

          Filesize

          232KB

          MD5

          b4bc745b6f0bff977f8ad3aa7c3bf39f

          SHA1

          46d70e756a992b3c722ea469b703d5e550013050

          SHA256

          82bffe3aefe8727220d77d23104bdf2bd7aea51a54dc5df6881ce04f0c2c33d9

          SHA512

          fce08601699054ad77a31df0575e3dcb178acbb7eaac181a5ec8fcedf19664601c1f1a0be28fee23fb6c0ed5797bb6a8f1a649c764ebcb44e330ddae425d147c