Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 00:28

General

  • Target

    c75c68db82f67ee83b5cb86f9312a7f8313378695cbda3e01b371ce44b7e20b9.exe

  • Size

    96KB

  • MD5

    84150e65bbda71ebfa938c33ff645051

  • SHA1

    79b0f9453bbcd881209d0b92a8cf5075678d67ec

  • SHA256

    c75c68db82f67ee83b5cb86f9312a7f8313378695cbda3e01b371ce44b7e20b9

  • SHA512

    d5891d168483a216726b89ba94ae303f5e3f24bda58e3b489d8b2406583ed67bd4c46864ef451012cc9240595755c8c3ddb73217c3857803e26a6bd9d889b761

  • SSDEEP

    1536:fUQBH9f6cO/h06FWd3kGulSc16l6u+NMMl/KlYv1Tq5ThF/NIjnZE1:P+hDodolu8CFF/Cna1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c75c68db82f67ee83b5cb86f9312a7f8313378695cbda3e01b371ce44b7e20b9.exe
    "C:\Users\Admin\AppData\Local\Temp\c75c68db82f67ee83b5cb86f9312a7f8313378695cbda3e01b371ce44b7e20b9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\ceouku.exe
      "C:\Users\Admin\ceouku.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ceouku.exe

    Filesize

    96KB

    MD5

    e4a57eb2cbc1e73583a4e0b4d6e650f0

    SHA1

    ad56d6a064e891cc44d8bccf71aeef36076f6b94

    SHA256

    4b39a5b58c5d0cf82462006671bc19b831660aed8d2581bf3b3d7118095db9f0

    SHA512

    505ee6fada8f3e0776f4df66f72dec732aa6491cc0055394900a07d2e6f3e3cf187d67d9654ec438bca69dae4d40dae03a4e600da1ad52d1175d6cda950748d9

  • C:\Users\Admin\ceouku.exe

    Filesize

    96KB

    MD5

    e4a57eb2cbc1e73583a4e0b4d6e650f0

    SHA1

    ad56d6a064e891cc44d8bccf71aeef36076f6b94

    SHA256

    4b39a5b58c5d0cf82462006671bc19b831660aed8d2581bf3b3d7118095db9f0

    SHA512

    505ee6fada8f3e0776f4df66f72dec732aa6491cc0055394900a07d2e6f3e3cf187d67d9654ec438bca69dae4d40dae03a4e600da1ad52d1175d6cda950748d9