Analysis

  • max time kernel
    184s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 20:23

General

  • Target

    ea364b86ce02f0b3d5019d17bb2b722a64821ea7c4ada6f45f493abead976c5b.exe

  • Size

    56KB

  • MD5

    8201881623a949bce290e5239eea2daa

  • SHA1

    2d81b23317cf4eea9b21531d8414ca56125caa6c

  • SHA256

    ea364b86ce02f0b3d5019d17bb2b722a64821ea7c4ada6f45f493abead976c5b

  • SHA512

    2d67488766e21d31e606d376790e92f611fe9975a3a7dcbd9662f4676b9e434b935891906964cba2331610b19567de2a57076eef646094403b76f6a2e7e030f1

  • SSDEEP

    768:59UvsMG3mHx5mEUML/V0zQCI+FIk2d+sFIkRc1NKejxPVNYn6uyzZspG6P8Lx4N6:59oCVj8IPEdLwqZNMBBe6ZxHRP6D5a

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea364b86ce02f0b3d5019d17bb2b722a64821ea7c4ada6f45f493abead976c5b.exe
    "C:\Users\Admin\AppData\Local\Temp\ea364b86ce02f0b3d5019d17bb2b722a64821ea7c4ada6f45f493abead976c5b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Users\Admin\gaove.exe
      "C:\Users\Admin\gaove.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4336

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\gaove.exe

          Filesize

          56KB

          MD5

          61f67fa0ee1e876a7d418b4033de04ce

          SHA1

          5d4944a320102d9d06c74ecb0ff58124ff6494ff

          SHA256

          72ae38465200d22482a1ec9e1b0e385c6e1f2ce66f717a714e04bd5957c92bbe

          SHA512

          f150056a56fc40b8606509e33f752037cde04f28e5a046341b3f8a1b28d5dddb32f4b1a3bacd833fc34a9321473026f884933174e263f207300887e9fe5f3df9

        • C:\Users\Admin\gaove.exe

          Filesize

          56KB

          MD5

          61f67fa0ee1e876a7d418b4033de04ce

          SHA1

          5d4944a320102d9d06c74ecb0ff58124ff6494ff

          SHA256

          72ae38465200d22482a1ec9e1b0e385c6e1f2ce66f717a714e04bd5957c92bbe

          SHA512

          f150056a56fc40b8606509e33f752037cde04f28e5a046341b3f8a1b28d5dddb32f4b1a3bacd833fc34a9321473026f884933174e263f207300887e9fe5f3df9