Analysis

  • max time kernel
    156s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 15:45

General

  • Target

    e11312f1a5ed6a50606a463059cdc79988beed912ccc623051325dde922a0cec.exe

  • Size

    208KB

  • MD5

    82d50da3b2a05a1219e4014410518810

  • SHA1

    ee4397032d95914317f0998de86c62c852c8f7f4

  • SHA256

    e11312f1a5ed6a50606a463059cdc79988beed912ccc623051325dde922a0cec

  • SHA512

    8ab422398e5b756778cad5c9c48d8df41aa3ff657a20d65c2cf7a9c55ba12b2c95f2e9496f34ff7b6effcfe9b6b17902796f1f09a8115ca391427b0d1cb72ce4

  • SSDEEP

    6144:9oNsRuQmToYfPeffkxsthVIVO+b/RnmbT4PW9UmE7ldESgvSAOuaw:9vuQmToYfPeffkxsthVIVO+b/9mbkPW1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e11312f1a5ed6a50606a463059cdc79988beed912ccc623051325dde922a0cec.exe
    "C:\Users\Admin\AppData\Local\Temp\e11312f1a5ed6a50606a463059cdc79988beed912ccc623051325dde922a0cec.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\feoxeur.exe
      "C:\Users\Admin\feoxeur.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\feoxeur.exe

    Filesize

    208KB

    MD5

    d13e32d12cf969db1a60629f1537778b

    SHA1

    9e5f4c4167589e030ae195737a8f0865668dc364

    SHA256

    74c202b774ac33c634225f5c7f49a10f96d3ad8806d475a520cc9e1b39657d7d

    SHA512

    a51ad0b32eaa15b9fba9589cbc479953cb6aaa6dd9b3c378f2a3dbeecd97788f86fc18e29f5b6e573863c4bd72371102accc3d00e2374e88358c090209c19f12

  • C:\Users\Admin\feoxeur.exe

    Filesize

    208KB

    MD5

    d13e32d12cf969db1a60629f1537778b

    SHA1

    9e5f4c4167589e030ae195737a8f0865668dc364

    SHA256

    74c202b774ac33c634225f5c7f49a10f96d3ad8806d475a520cc9e1b39657d7d

    SHA512

    a51ad0b32eaa15b9fba9589cbc479953cb6aaa6dd9b3c378f2a3dbeecd97788f86fc18e29f5b6e573863c4bd72371102accc3d00e2374e88358c090209c19f12