Analysis

  • max time kernel
    161s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2022, 21:35

General

  • Target

    6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061.exe

  • Size

    320KB

  • MD5

    0c0deb9d2653e2e87898f5cd20824050

  • SHA1

    b7e0923abf16fc454b2a26cbca9e87bb5b25bd1a

  • SHA256

    6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061

  • SHA512

    95866740ebb74a857532c3932ca91b2abdfd0627ba24be7d3433d2c5450adc0fb7897c4b48492cfec74e017cf1032e11be121ed1e554591716fc4b7f924e97e6

  • SSDEEP

    6144:ti+xPxlJGiiB8J66onJGr+qyVztumGS5Ni3hpgoMKMphaeVf2B717z:ttPjJGiic6JGr+qyVztumGS5YqoyU71/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061.exe
    "C:\Users\Admin\AppData\Local\Temp\6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\joihoo.exe
      "C:\Users\Admin\joihoo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\joihoo.exe

    Filesize

    320KB

    MD5

    7ab932bfbd9263b5454e04d63bffc958

    SHA1

    5d057e90ebb7686f47fe254cd3ec3d45d3bbf110

    SHA256

    c60b9f314854449889b769b92e352e5b011a2acb513a0efd8555f17bd0be72a3

    SHA512

    4876e0c2706c14ffc7d8536c076735bd1fc3d0f92b3521d9dae953389d66bfe54d2536a3030f00b75330c188d1837198205ff19f65639c9587cadc4e0d28acd8

  • C:\Users\Admin\joihoo.exe

    Filesize

    320KB

    MD5

    7ab932bfbd9263b5454e04d63bffc958

    SHA1

    5d057e90ebb7686f47fe254cd3ec3d45d3bbf110

    SHA256

    c60b9f314854449889b769b92e352e5b011a2acb513a0efd8555f17bd0be72a3

    SHA512

    4876e0c2706c14ffc7d8536c076735bd1fc3d0f92b3521d9dae953389d66bfe54d2536a3030f00b75330c188d1837198205ff19f65639c9587cadc4e0d28acd8

  • memory/1016-132-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1016-141-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4128-140-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4128-142-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB