Analysis

  • max time kernel
    163s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 16:15

General

  • Target

    35a57b087e9ddc7dbcaa72d857061eedfb3475bf892447eb8b80a1b387cfd6ca.exe

  • Size

    96KB

  • MD5

    83f018d08a6ccd698fcc203055bf62d5

  • SHA1

    89e51e15b893e4a201d8dfc83f21cd3dffd8717b

  • SHA256

    35a57b087e9ddc7dbcaa72d857061eedfb3475bf892447eb8b80a1b387cfd6ca

  • SHA512

    e289a42fb4f4ba855225e14675aea756dec6cf26102322c18175090cb46fd58c0286076cdcabf22d5db45667923b40fab79ba50794c23cdf4a9d611baecd2e61

  • SSDEEP

    1536:fcDEg52c9tyVQO8P8ychGuwjj3RJNEo/knRzdnynE7RldNEP8lijOevNIjnZP:feE/celychGHzR3Ek65RldqvCnx

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35a57b087e9ddc7dbcaa72d857061eedfb3475bf892447eb8b80a1b387cfd6ca.exe
    "C:\Users\Admin\AppData\Local\Temp\35a57b087e9ddc7dbcaa72d857061eedfb3475bf892447eb8b80a1b387cfd6ca.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Users\Admin\teeheag.exe
      "C:\Users\Admin\teeheag.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\teeheag.exe

    Filesize

    96KB

    MD5

    0a5695030572fdb5373297426f8b03c8

    SHA1

    b200a7d0cb9ecc76a2823a3ac2cbf34b0bf3d498

    SHA256

    421c200c279296cb60bba87f5385459db4eb5878d5d16e71e941894f2944bee8

    SHA512

    adf63ab42a026090f9c6ee88cf2102c37efb53c4ed1608a84f23b01b896a05ab4f8110e8035d0a5ecfae51e462d7a5546c93f268825db4bd8f52ea6467a41521

  • C:\Users\Admin\teeheag.exe

    Filesize

    96KB

    MD5

    0a5695030572fdb5373297426f8b03c8

    SHA1

    b200a7d0cb9ecc76a2823a3ac2cbf34b0bf3d498

    SHA256

    421c200c279296cb60bba87f5385459db4eb5878d5d16e71e941894f2944bee8

    SHA512

    adf63ab42a026090f9c6ee88cf2102c37efb53c4ed1608a84f23b01b896a05ab4f8110e8035d0a5ecfae51e462d7a5546c93f268825db4bd8f52ea6467a41521