Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 19:40

General

  • Target

    d155f899deec0938a43ad6038270333b387744df07e92f3d6e5b693db895ee33.exe

  • Size

    256KB

  • MD5

    91d83f1c14f188004527720ba0cf6be6

  • SHA1

    80a751bcd966e54b9ae7239046b8ed9e670e9a03

  • SHA256

    d155f899deec0938a43ad6038270333b387744df07e92f3d6e5b693db895ee33

  • SHA512

    5b0c3b007eec8278e5738990e4d8dc6852f20c547e7388387a7b401bf1f5bb745f9770ad4e696bc3304146ddb6a06ec7bbfb87c67b6174fb6199f2836bbf3b4f

  • SSDEEP

    6144:9VGuQZUvhOoOirF1rsNjqH94M7RNo913Ml2Knvmb7/D26QkQeOzRoJ:JQZUvhOoOMF1rsNjqgH3Ml2Knvmb7/DB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d155f899deec0938a43ad6038270333b387744df07e92f3d6e5b693db895ee33.exe
    "C:\Users\Admin\AppData\Local\Temp\d155f899deec0938a43ad6038270333b387744df07e92f3d6e5b693db895ee33.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\Users\Admin\fauiro.exe
      "C:\Users\Admin\fauiro.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fauiro.exe

    Filesize

    256KB

    MD5

    e8e344d63bc155e1b8efc5ea1f7fc2cb

    SHA1

    307d852188c1b40b7b8b21f8efd1648b51b8bed1

    SHA256

    ff2ff73875fe7e0376b421fc0a542a1ecb636ee6185f5d8e490213dd25f51b12

    SHA512

    3e30a515da833d8088facb2a8b4ce08d1dc8a0891a45559a5578abaa5b0140cd73e33e1dddbaff5e811253be9cc34a6216aa9737f7d64a4c86bed09c2009120d

  • C:\Users\Admin\fauiro.exe

    Filesize

    256KB

    MD5

    e8e344d63bc155e1b8efc5ea1f7fc2cb

    SHA1

    307d852188c1b40b7b8b21f8efd1648b51b8bed1

    SHA256

    ff2ff73875fe7e0376b421fc0a542a1ecb636ee6185f5d8e490213dd25f51b12

    SHA512

    3e30a515da833d8088facb2a8b4ce08d1dc8a0891a45559a5578abaa5b0140cd73e33e1dddbaff5e811253be9cc34a6216aa9737f7d64a4c86bed09c2009120d