Analysis

  • max time kernel
    157s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 14:35

General

  • Target

    eeed1b15c4d5664cf16d318d386c9e91756da7ecd2541aab9eca3143568638a2.exe

  • Size

    124KB

  • MD5

    96503e97509638f1c4f6d57607a776ec

  • SHA1

    5ddab9b022830320a75912d09484e0d3815dbbab

  • SHA256

    eeed1b15c4d5664cf16d318d386c9e91756da7ecd2541aab9eca3143568638a2

  • SHA512

    4c6a6ee3f72e7f1b37b9d78dcca5f45a98c4549b9015103b4520fba982c5545e2b1ba0eb8a10df815084be2494ac640fdf064c8bb05933aa6dcc64ac56cb4cb2

  • SSDEEP

    1536:CGZlFFArWaYkiQixA+alh98t8aF9USvXjyIwo7JaSU:dZlFFArWejH8tq8vwQG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eeed1b15c4d5664cf16d318d386c9e91756da7ecd2541aab9eca3143568638a2.exe
    "C:\Users\Admin\AppData\Local\Temp\eeed1b15c4d5664cf16d318d386c9e91756da7ecd2541aab9eca3143568638a2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Users\Admin\baoela.exe
      "C:\Users\Admin\baoela.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\baoela.exe

    Filesize

    124KB

    MD5

    41712782af8e3cc7e4cce70ef496c80d

    SHA1

    fe22ab4818536e4b865fe1a19bee5df1bd932f7b

    SHA256

    53c4b4473970798ea1b0629b17704a4e3939b37cc060189e1d10bd7b558a0d2c

    SHA512

    0a6c80c9c2cb3e90ca9ca5ad186da71ef987439762893427df70b3605bb567a936ce772466f254d6020257e61933f7def1a3aea0e5e1cc8b8c1b5fd737879f92

  • C:\Users\Admin\baoela.exe

    Filesize

    124KB

    MD5

    41712782af8e3cc7e4cce70ef496c80d

    SHA1

    fe22ab4818536e4b865fe1a19bee5df1bd932f7b

    SHA256

    53c4b4473970798ea1b0629b17704a4e3939b37cc060189e1d10bd7b558a0d2c

    SHA512

    0a6c80c9c2cb3e90ca9ca5ad186da71ef987439762893427df70b3605bb567a936ce772466f254d6020257e61933f7def1a3aea0e5e1cc8b8c1b5fd737879f92