Analysis

  • max time kernel
    153s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2022, 02:43

General

  • Target

    80f04e81f974308f7d148a73e3cd69d1fab17969272fef7d911b9cde82063ebd.exe

  • Size

    244KB

  • MD5

    609b1c9111c41bbf9d9d6b5062b7f49a

  • SHA1

    b5e4c257f7102d0d75108952b2be73152bc47d10

  • SHA256

    80f04e81f974308f7d148a73e3cd69d1fab17969272fef7d911b9cde82063ebd

  • SHA512

    ffe8fa9207139ec0fa9dd77d7147cecb1b20a0eb2fbe2f92d7cc3692d4ae3447dbaac5bc087df4ad8db69b0fbe0db8d05797290172e3747a38b11c203d56975a

  • SSDEEP

    6144:B+w8DFe0qip4r1XNOmNBLxAG7H59R7g0fY4rGK/fObT/bGijVq1Wzr/+mNGXnFGi:BV8DFe0qip4rZNOm3FAG7H59R7g0fY4f

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80f04e81f974308f7d148a73e3cd69d1fab17969272fef7d911b9cde82063ebd.exe
    "C:\Users\Admin\AppData\Local\Temp\80f04e81f974308f7d148a73e3cd69d1fab17969272fef7d911b9cde82063ebd.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\fiokeiz.exe
      "C:\Users\Admin\fiokeiz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4496

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\fiokeiz.exe

          Filesize

          244KB

          MD5

          bda2c2be0e825ac855a86d9214ed8cce

          SHA1

          614f9a441c8d3a95f139cea50a2b9601f3da2e69

          SHA256

          d727ba480188ba46ac9a7d4007f97eab61996dfe0cb9bd6e6f0126b12424d37c

          SHA512

          c75e3d2e388d7cc5f6d1b0bf86b7e01aa683f66e77e84070c5b7d40021dfb2a81fb569018921ab4be2259fc40f76263876b4702c5a14cfea1e6df8f1faf4021b

        • C:\Users\Admin\fiokeiz.exe

          Filesize

          244KB

          MD5

          bda2c2be0e825ac855a86d9214ed8cce

          SHA1

          614f9a441c8d3a95f139cea50a2b9601f3da2e69

          SHA256

          d727ba480188ba46ac9a7d4007f97eab61996dfe0cb9bd6e6f0126b12424d37c

          SHA512

          c75e3d2e388d7cc5f6d1b0bf86b7e01aa683f66e77e84070c5b7d40021dfb2a81fb569018921ab4be2259fc40f76263876b4702c5a14cfea1e6df8f1faf4021b