Analysis

  • max time kernel
    151s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 16:24

General

  • Target

    aca8d65a9704f3c8e32d8199188d2a9293d58d3dd38f7ac1b11e07e0827ce522.exe

  • Size

    288KB

  • MD5

    a37ae15149e32af2d3535e2a7a10e220

  • SHA1

    51b81962da33238686707024a70782d04882eb28

  • SHA256

    aca8d65a9704f3c8e32d8199188d2a9293d58d3dd38f7ac1b11e07e0827ce522

  • SHA512

    c20120384efd7bfcfebcb91f878b976e164c87f4d1ff35bbcfe3c9635eb9efe7d31f51be57dcdb8d8eadaec3ecfbd621761ea561d58a8eeac4fcaf7e650ac68c

  • SSDEEP

    6144:l1ufc0f7XP+g3AGJpWVzu82oMKnvmb7/D26jiuX1N38RAFrjgWtokZkuL6O96/YS:l527/XvLWpu82oMKnvmb7/D26j138RAW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aca8d65a9704f3c8e32d8199188d2a9293d58d3dd38f7ac1b11e07e0827ce522.exe
    "C:\Users\Admin\AppData\Local\Temp\aca8d65a9704f3c8e32d8199188d2a9293d58d3dd38f7ac1b11e07e0827ce522.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\pouapo.exe
      "C:\Users\Admin\pouapo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\pouapo.exe

    Filesize

    288KB

    MD5

    6362df55c5f49044ce266ea737f76dab

    SHA1

    59e31ef0976edd8b89ad4baa3ebd734384024d3b

    SHA256

    4c7f939884c087beeb16d6b64f0b513fc9756862b592d0a196f66337e6c33390

    SHA512

    026392abcd489116b6bc6ac4e3234fb866dca66eab2364ece5597952474c63668249f158477c226454b8ecc13069eff06f9306b99ed68e98a31044247e8901c2

  • C:\Users\Admin\pouapo.exe

    Filesize

    288KB

    MD5

    6362df55c5f49044ce266ea737f76dab

    SHA1

    59e31ef0976edd8b89ad4baa3ebd734384024d3b

    SHA256

    4c7f939884c087beeb16d6b64f0b513fc9756862b592d0a196f66337e6c33390

    SHA512

    026392abcd489116b6bc6ac4e3234fb866dca66eab2364ece5597952474c63668249f158477c226454b8ecc13069eff06f9306b99ed68e98a31044247e8901c2

  • memory/2276-134-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2276-141-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/3948-140-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/3948-142-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB