Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 00:04

General

  • Target

    4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe

  • Size

    556KB

  • MD5

    570e2f11e0da3acc19c49b2891b13ec6

  • SHA1

    c6ee78e90327357da1a4b784d77f75e07942f69d

  • SHA256

    4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339

  • SHA512

    61ed74a7bbb4d7d5635020b629b265c8c2a9b768d9dc982a450739ff01f15e4c769afaa952a31463b886c54f809fd5fa737ebc802355f992869475071f845aa5

  • SSDEEP

    1536:SbxIUJKzDp+4e/BnZlTg9L4wPMwrLHDDG3ERz4QcJ5JM:0bODp5eJnZYMwrrLHDDG3BJM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe
    "C:\Users\Admin\AppData\Local\Temp\4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Users\Admin\jtwuz.exe
      "C:\Users\Admin\jtwuz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jtwuz.exe

    Filesize

    556KB

    MD5

    c6be8a65bea98170cbb2fb632d3ef283

    SHA1

    9469e68eb4ad0e9d9bf69b2477195c99d4c96224

    SHA256

    e3d01ac7ada63156536296c7fae1c2a6df3e88fd62df6abdcd4f5943e2372826

    SHA512

    a2c6ca46afb1476621240d69bbcda0b3f630f3e3220d5c2ed0e23154d088f0f5ce12bdd5915ecf112b680a86e68acb827bb396f65757d410bb1ee451e71b90c8

  • C:\Users\Admin\jtwuz.exe

    Filesize

    556KB

    MD5

    c6be8a65bea98170cbb2fb632d3ef283

    SHA1

    9469e68eb4ad0e9d9bf69b2477195c99d4c96224

    SHA256

    e3d01ac7ada63156536296c7fae1c2a6df3e88fd62df6abdcd4f5943e2372826

    SHA512

    a2c6ca46afb1476621240d69bbcda0b3f630f3e3220d5c2ed0e23154d088f0f5ce12bdd5915ecf112b680a86e68acb827bb396f65757d410bb1ee451e71b90c8

  • memory/312-135-0x0000000000000000-mapping.dmp

  • memory/312-140-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/312-142-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/4264-134-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/4264-141-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB