Analysis

  • max time kernel
    154s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 20:13

General

  • Target

    e066071e46cc8a5ff3c1ee02859822244b2fc98b67d4ba4898a5802142949ed7.exe

  • Size

    280KB

  • MD5

    9233f9513ea1419e3ed2ffb2c0c6bec3

  • SHA1

    673173fc93332c01a8d2a14ae5867c8f163e6724

  • SHA256

    e066071e46cc8a5ff3c1ee02859822244b2fc98b67d4ba4898a5802142949ed7

  • SHA512

    aa594e97c6007eb40dff6c0c1a254030d66b5a5fb5c5e5b4525c46bcaf018da3da864595565f4cef8b08dddf546f2ff104d7a68c01f00a1071941475d6b54dfe

  • SSDEEP

    3072:rkW/vNMkT/Ozb1/7Vc1tdjZQQLnQhhyBZ8Irfdaqebssot7rFVtWzdbcOBXIU:rP6K2bVMJuQ0hhynfdaJqNrtWzCCD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e066071e46cc8a5ff3c1ee02859822244b2fc98b67d4ba4898a5802142949ed7.exe
    "C:\Users\Admin\AppData\Local\Temp\e066071e46cc8a5ff3c1ee02859822244b2fc98b67d4ba4898a5802142949ed7.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\neousi.exe
      "C:\Users\Admin\neousi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2400

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\neousi.exe

          Filesize

          280KB

          MD5

          260294de7064dec9c94a82b7cce96208

          SHA1

          9932008fa7243b626c75801662a71bf22617e177

          SHA256

          06019fc21e463f87dc9eea53797d9ef11791ee93c06a9043518c059ae1a672eb

          SHA512

          11b28d9a651ffba325c328bd9253859979493d2870f101d29f0ee6903e71d00580b8518fc4aaea3615ab33dc1c73d5f2849923d18bd60ab1400abe12dfeaa8b3

        • C:\Users\Admin\neousi.exe

          Filesize

          280KB

          MD5

          260294de7064dec9c94a82b7cce96208

          SHA1

          9932008fa7243b626c75801662a71bf22617e177

          SHA256

          06019fc21e463f87dc9eea53797d9ef11791ee93c06a9043518c059ae1a672eb

          SHA512

          11b28d9a651ffba325c328bd9253859979493d2870f101d29f0ee6903e71d00580b8518fc4aaea3615ab33dc1c73d5f2849923d18bd60ab1400abe12dfeaa8b3