Analysis

  • max time kernel
    162s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2022 03:46

General

  • Target

    577cc571f5ca8f1125dcacd9110f4e7da90e881d469533740943438fe256334f.exe

  • Size

    156KB

  • MD5

    70cc302775a0be9657249afebecdaed0

  • SHA1

    67b4538de25649f6788af8ff48a6bde5fbec7fe4

  • SHA256

    577cc571f5ca8f1125dcacd9110f4e7da90e881d469533740943438fe256334f

  • SHA512

    a51fc3f373f5f57bde7d522c824d7d73cb2d8f7b78b27a65e18e80fe18334d27a35e40f55c5096362d6cca6c79ec81981a20236e0ebf3e1d205253a08f96c326

  • SSDEEP

    3072:VKzwSpGbGb6JUBGnvZHpXtNLdZkkVYaZvLStH/h7yc2dK2E5j4oQlR:w8jbGb6JaGnvZZtNLdZkRapLmH8c2dCd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\577cc571f5ca8f1125dcacd9110f4e7da90e881d469533740943438fe256334f.exe
    "C:\Users\Admin\AppData\Local\Temp\577cc571f5ca8f1125dcacd9110f4e7da90e881d469533740943438fe256334f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Users\Admin\gauifih.exe
      "C:\Users\Admin\gauifih.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gauifih.exe

    Filesize

    156KB

    MD5

    e42d62479f94a1bab4dc72e0fc8224aa

    SHA1

    82c449a350b0fb805ff5fbff2a0244e2d4aff87d

    SHA256

    6bff28e7da157c00868bc34c9920dd737da2d24a338065bc5e53b12a636460ce

    SHA512

    66277941109f546330acd25c80786ae9f02d5f34cc439ee03a8dbc5ff47cdd8b0f9e503a9d4b5511202ec05aaaa5d4a93cd0c791eccf6a7b1f7b7b6c62c83cdf

  • C:\Users\Admin\gauifih.exe

    Filesize

    156KB

    MD5

    e42d62479f94a1bab4dc72e0fc8224aa

    SHA1

    82c449a350b0fb805ff5fbff2a0244e2d4aff87d

    SHA256

    6bff28e7da157c00868bc34c9920dd737da2d24a338065bc5e53b12a636460ce

    SHA512

    66277941109f546330acd25c80786ae9f02d5f34cc439ee03a8dbc5ff47cdd8b0f9e503a9d4b5511202ec05aaaa5d4a93cd0c791eccf6a7b1f7b7b6c62c83cdf