Analysis

  • max time kernel
    188s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 10:18

General

  • Target

    8a6f2d7f933d0b69d4c1e2c0048d3e3465f34349c427bcc9ade813661bd9d22a.exe

  • Size

    224KB

  • MD5

    7aea1a14d1b2eda0858ba58484dddd10

  • SHA1

    e3712cbae9d5d855bb879952990226df01da9658

  • SHA256

    8a6f2d7f933d0b69d4c1e2c0048d3e3465f34349c427bcc9ade813661bd9d22a

  • SHA512

    ceca0d6ab74b92c31603fa2b4fba214bed73d573947f84c5d6ba30a4c260f69200fc34ebde34d03bf574726ce6c281a7228937f64e93fead1b326c80b9d86d76

  • SSDEEP

    6144:tUqO83FrSU0bIaX/m7bfTWaJPGeyb7qh7wNAZBbM3f1jG:tUqO8RSU0bIaX/m7bfTWaV1wWZBbM3fg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a6f2d7f933d0b69d4c1e2c0048d3e3465f34349c427bcc9ade813661bd9d22a.exe
    "C:\Users\Admin\AppData\Local\Temp\8a6f2d7f933d0b69d4c1e2c0048d3e3465f34349c427bcc9ade813661bd9d22a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:392
    • C:\Users\Admin\siiti.exe
      "C:\Users\Admin\siiti.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2576

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\siiti.exe

          Filesize

          224KB

          MD5

          2d254a9fc4f40bc939abad5e59c8364b

          SHA1

          784ab9253a61dfc70d58d7db61a2c12ec27af910

          SHA256

          3437fc5d6d9066866b3939fcd7230c19338e71f645d574c3e8a6c293e73d47a5

          SHA512

          fb2efc419ff898642383e8ad0ab9b3891d25294eb9343676879659423e7736224c635e6f68817c1bd373461e70b051913d43ea4f024ff17f1952b1c3ff50f16d

        • C:\Users\Admin\siiti.exe

          Filesize

          224KB

          MD5

          2d254a9fc4f40bc939abad5e59c8364b

          SHA1

          784ab9253a61dfc70d58d7db61a2c12ec27af910

          SHA256

          3437fc5d6d9066866b3939fcd7230c19338e71f645d574c3e8a6c293e73d47a5

          SHA512

          fb2efc419ff898642383e8ad0ab9b3891d25294eb9343676879659423e7736224c635e6f68817c1bd373461e70b051913d43ea4f024ff17f1952b1c3ff50f16d