Analysis

  • max time kernel
    172s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 00:23

General

  • Target

    e4221a3670c63dacb51d4278e0deb9d215de8a2bf75a4eebf80e6f88812d2791.exe

  • Size

    104KB

  • MD5

    a32df0fa8ac7be1e0480ad2add916c60

  • SHA1

    0fd2528ed651332c52cd26e643920785a68ffb94

  • SHA256

    e4221a3670c63dacb51d4278e0deb9d215de8a2bf75a4eebf80e6f88812d2791

  • SHA512

    a73893383cc76bad052ad3adce92543a4516afc509305ea60004774cdb1903c4dccc3ac786a8040e14ac50da8c52dcf15e00dc60e4a0cd7f03780334d91d6e8c

  • SSDEEP

    1536:b1shvr9f8ieh6hC3KwTHlyHcw1rqVjSxakAyBGGcJ5J9r:GhTlZehWwTHlyHBQNSxWJ9r

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4221a3670c63dacb51d4278e0deb9d215de8a2bf75a4eebf80e6f88812d2791.exe
    "C:\Users\Admin\AppData\Local\Temp\e4221a3670c63dacb51d4278e0deb9d215de8a2bf75a4eebf80e6f88812d2791.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\juevuoq.exe
      "C:\Users\Admin\juevuoq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\juevuoq.exe

    Filesize

    104KB

    MD5

    8164c7e80bc3bc33a85d0547ceda8700

    SHA1

    6b66921e8d66774c00a33697d79f8a2992e893ba

    SHA256

    0f21048c33364995342f1ff89c8af6f35bcf935e9064fa86144cbdb99fb41a9f

    SHA512

    cbc2747a2b2203e79dfbc8fb31a9b55a41df50435363b96533b2ff1aec259bf8f0a187ed94de1cc61b95a7a101decbb0eadddec4fe7e03586636e44ed9ed4238

  • C:\Users\Admin\juevuoq.exe

    Filesize

    104KB

    MD5

    8164c7e80bc3bc33a85d0547ceda8700

    SHA1

    6b66921e8d66774c00a33697d79f8a2992e893ba

    SHA256

    0f21048c33364995342f1ff89c8af6f35bcf935e9064fa86144cbdb99fb41a9f

    SHA512

    cbc2747a2b2203e79dfbc8fb31a9b55a41df50435363b96533b2ff1aec259bf8f0a187ed94de1cc61b95a7a101decbb0eadddec4fe7e03586636e44ed9ed4238