Analysis

  • max time kernel
    153s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 19:41

General

  • Target

    cc35cb501bff9efd0ba76c5289ca8bfaee874b6dca6433d87dbc5b593f7c9247.exe

  • Size

    164KB

  • MD5

    a23f37290ed4242c789ad7752457aa60

  • SHA1

    dc9d8438e8e0e2fd848f446c8ba6d6c4eafdaaef

  • SHA256

    cc35cb501bff9efd0ba76c5289ca8bfaee874b6dca6433d87dbc5b593f7c9247

  • SHA512

    0f0a03c9106246c1a4386af1f62587c0a1aa9b955632436d2e0f21e40a5dcb904f6009c7577823ef4d5cde041f65e79e6f9bad18cb6dfd882a5532f79076c4ee

  • SSDEEP

    3072:0oHMk+jHbub8Vq0mEFlXPb+OXNJDtOdS7dcovBuoF+N7bZD16iYIQusGGTkLGFMW:crHKQVqnAXPaAtOdS7dcovBuoF+N7bZ8

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc35cb501bff9efd0ba76c5289ca8bfaee874b6dca6433d87dbc5b593f7c9247.exe
    "C:\Users\Admin\AppData\Local\Temp\cc35cb501bff9efd0ba76c5289ca8bfaee874b6dca6433d87dbc5b593f7c9247.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\weoya.exe
      "C:\Users\Admin\weoya.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\weoya.exe

    Filesize

    164KB

    MD5

    b98026e9f3d78f7b7af62b738059b0f1

    SHA1

    b2e0a963582e1c39dabc60be6e5f3b25577a0af7

    SHA256

    3bcb9ba7cb8adc63cae1771a7a5f7ef59ab5290832d7dbbab2757115f02600aa

    SHA512

    84d503b5d07ba60f8fe7b4fb704af927b067fe8812cefcbe20e6d9b32c195c89c24763b546c856eaf6888983c0f8c13e72f3b1de05ff1e7bec04e81a959f5061

  • C:\Users\Admin\weoya.exe

    Filesize

    164KB

    MD5

    b98026e9f3d78f7b7af62b738059b0f1

    SHA1

    b2e0a963582e1c39dabc60be6e5f3b25577a0af7

    SHA256

    3bcb9ba7cb8adc63cae1771a7a5f7ef59ab5290832d7dbbab2757115f02600aa

    SHA512

    84d503b5d07ba60f8fe7b4fb704af927b067fe8812cefcbe20e6d9b32c195c89c24763b546c856eaf6888983c0f8c13e72f3b1de05ff1e7bec04e81a959f5061