Analysis

  • max time kernel
    167s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2022, 01:47

General

  • Target

    158fad336029800039ac08555c9aaca7a9babbeef112f31954f0d3796fc06f7f.exe

  • Size

    156KB

  • MD5

    623e4bd9df0dc871fe9a213705651dcd

  • SHA1

    7b77bf36f62a5c0f4b977d55eab367d0b59d9646

  • SHA256

    158fad336029800039ac08555c9aaca7a9babbeef112f31954f0d3796fc06f7f

  • SHA512

    7565c29904ab23e5f9bc579af02b4a133ad5826efdaa81067f437b6df13ba6c8d6d64ff7e37734afba8cc5f1fddb095743e07207872204790a66a4410cf75ae8

  • SSDEEP

    1536:yHkumXuY6ClBU8gRDGHPOGMmUbaxGAka+t/K9rCGaV9mw7Jqx8M+dzAbWQgRV7:lXuY3a4UbaxqkCGaVD7JqfKAbno7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\158fad336029800039ac08555c9aaca7a9babbeef112f31954f0d3796fc06f7f.exe
    "C:\Users\Admin\AppData\Local\Temp\158fad336029800039ac08555c9aaca7a9babbeef112f31954f0d3796fc06f7f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\rdmaaw.exe
      "C:\Users\Admin\rdmaaw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rdmaaw.exe

    Filesize

    156KB

    MD5

    3b84c5e68d5780c6de3113b623ecb391

    SHA1

    2fced9a700ed2faba8e9c90313cc86ef7bafa318

    SHA256

    b71c888e020551695f086b75174341027f409057d45aff2121a884d192e3dcdb

    SHA512

    59181b920049b557492199ab335651fa94e5a468415d53cf8c0146fc2c2ff5f10c245055939682fffc6db46273445fd0b405e193490f52032261e61a3aefd011

  • C:\Users\Admin\rdmaaw.exe

    Filesize

    156KB

    MD5

    3b84c5e68d5780c6de3113b623ecb391

    SHA1

    2fced9a700ed2faba8e9c90313cc86ef7bafa318

    SHA256

    b71c888e020551695f086b75174341027f409057d45aff2121a884d192e3dcdb

    SHA512

    59181b920049b557492199ab335651fa94e5a468415d53cf8c0146fc2c2ff5f10c245055939682fffc6db46273445fd0b405e193490f52032261e61a3aefd011