Analysis

  • max time kernel
    191s
  • max time network
    219s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 00:15

General

  • Target

    951d138339cdfc1d0a4f7f512b60422dec13bfe2fcc8bf792708608d9855b209.exe

  • Size

    156KB

  • MD5

    92d3ff1eaf6a2d29a2ad25e94d639c60

  • SHA1

    1a6a3e4884743768b7d3aa88c94b4e44205a752b

  • SHA256

    951d138339cdfc1d0a4f7f512b60422dec13bfe2fcc8bf792708608d9855b209

  • SHA512

    b39e22d8962027883211290f7fbd3c86087db56d06b85b6e9b36b95a4f960b1f4eed412412dfe90a7c91bfd8f7b8038211d9bb46ae4c9664824f19bdc81e443f

  • SSDEEP

    3072:A8VmcOK9IOJeC+3Ip4CFbgjZnJygNqHVbwvVTSIs04oQZiEr5:1VmJK9psIp44bgjZzwVoT2QWz

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\951d138339cdfc1d0a4f7f512b60422dec13bfe2fcc8bf792708608d9855b209.exe
    "C:\Users\Admin\AppData\Local\Temp\951d138339cdfc1d0a4f7f512b60422dec13bfe2fcc8bf792708608d9855b209.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\htsab.exe
      "C:\Users\Admin\htsab.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\htsab.exe

    Filesize

    156KB

    MD5

    bf9e8c5e39f2d56dfde681af5f942e06

    SHA1

    4418d075645dd6b9470f43597173389d024662a3

    SHA256

    00bf081b104394871b4a6dbf4029cd958e3ff9a751f24c353eaa51367a1d715f

    SHA512

    ea03e7c40678e61650d89d96b6fe8ade9d7690b89221a3b13dad8ff3a65c748891a465e38c4ae319ccc6c14af0d368141cea12d1f982b89e4ff6b05da826341d

  • C:\Users\Admin\htsab.exe

    Filesize

    156KB

    MD5

    bf9e8c5e39f2d56dfde681af5f942e06

    SHA1

    4418d075645dd6b9470f43597173389d024662a3

    SHA256

    00bf081b104394871b4a6dbf4029cd958e3ff9a751f24c353eaa51367a1d715f

    SHA512

    ea03e7c40678e61650d89d96b6fe8ade9d7690b89221a3b13dad8ff3a65c748891a465e38c4ae319ccc6c14af0d368141cea12d1f982b89e4ff6b05da826341d