Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 16:20

General

  • Target

    3722255efbce29df84d1b0d3a124575bca56e3467ed3ce1ee5571b7fd44c9289.exe

  • Size

    160KB

  • MD5

    83c8e201413515d9b62da74d9c927590

  • SHA1

    3471bbe169ce59f8013746fc0fc967bb6ea62574

  • SHA256

    3722255efbce29df84d1b0d3a124575bca56e3467ed3ce1ee5571b7fd44c9289

  • SHA512

    abc965e4b30da9efdea8e0ff811af07e3a6b4ab7e4b85fdb8e237809e81c7db06924ed6f69b873e3e86e446e1e596715ad25053befc61467fb1d9a604212e61c

  • SSDEEP

    3072:eGzsrB6oe5g+GwJs8K9YUoIrJaRuSZ/JlQPj/PYv2wM0B2vmkHgHAGFAhl4oQZi3:eGwrnP9YErMRuSZ/JlQLHYv2PvzGAMAb

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3722255efbce29df84d1b0d3a124575bca56e3467ed3ce1ee5571b7fd44c9289.exe
    "C:\Users\Admin\AppData\Local\Temp\3722255efbce29df84d1b0d3a124575bca56e3467ed3ce1ee5571b7fd44c9289.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5116
    • C:\Users\Admin\bouxia.exe
      "C:\Users\Admin\bouxia.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\bouxia.exe

    Filesize

    160KB

    MD5

    93ee3dd355d5f927587575f053c560c5

    SHA1

    0316f6e3bbaa63c679ed16ea8ae4013dd4f6f9c8

    SHA256

    d36b749d6088c62a5402d123b053c74254eb84f0539731bfb2647b6d17e4aff6

    SHA512

    eb4545bda24efdaceed992d1fa81520b377b6803c2039876e93bfc67b924f381215e83e59b2e66dca7453e8a41b3e282a56120d029bdb9ba80777e4efe4d65d3

  • C:\Users\Admin\bouxia.exe

    Filesize

    160KB

    MD5

    93ee3dd355d5f927587575f053c560c5

    SHA1

    0316f6e3bbaa63c679ed16ea8ae4013dd4f6f9c8

    SHA256

    d36b749d6088c62a5402d123b053c74254eb84f0539731bfb2647b6d17e4aff6

    SHA512

    eb4545bda24efdaceed992d1fa81520b377b6803c2039876e93bfc67b924f381215e83e59b2e66dca7453e8a41b3e282a56120d029bdb9ba80777e4efe4d65d3

  • memory/4832-134-0x0000000000000000-mapping.dmp