Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 10:21

General

  • Target

    df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe

  • Size

    256KB

  • MD5

    a0974491d06a1f058b1e3176724f5d32

  • SHA1

    2b50fe4bb4df8247f3a5083c0f86f8424a63e03e

  • SHA256

    df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84

  • SHA512

    83bc0be99fe96b10109a0520db012c7fd6fcaab7baecadb0e7aad5b18f6699855e53d8f8e48ef0f0a79ce58dff64aea0139c9c5825766a14010296d33a17c0ce

  • SSDEEP

    6144:BiGDh4jLt4NVcWgyGELwXiS8T+bbhn7aRjS5ZgXbG:AGWntWyD1LiS8lS5Zi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe
    "C:\Users\Admin\AppData\Local\Temp\df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Users\Admin\liayuur.exe
      "C:\Users\Admin\liayuur.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\liayuur.exe

    Filesize

    256KB

    MD5

    ebdbd10980854ef07a3dfb8be74679de

    SHA1

    ed5cbe2ddd7bea4ae4bb6cb7151820c4e0f515c5

    SHA256

    385a82af54111afa01f4095e561296c49bd6db6ff54b9b42d7345bf3bd427673

    SHA512

    4d84008203717b3ec256135a7bd554909f7f91e599a8ae960e4326259c9cbf353f774dbbf2d6b8a9dfed9e9896227ceb171c70e348b444ec7bf50c16943b5adc

  • C:\Users\Admin\liayuur.exe

    Filesize

    256KB

    MD5

    ebdbd10980854ef07a3dfb8be74679de

    SHA1

    ed5cbe2ddd7bea4ae4bb6cb7151820c4e0f515c5

    SHA256

    385a82af54111afa01f4095e561296c49bd6db6ff54b9b42d7345bf3bd427673

    SHA512

    4d84008203717b3ec256135a7bd554909f7f91e599a8ae960e4326259c9cbf353f774dbbf2d6b8a9dfed9e9896227ceb171c70e348b444ec7bf50c16943b5adc

  • memory/536-134-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/536-141-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/4844-140-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/4844-142-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB