Analysis

  • max time kernel
    198s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 11:27

General

  • Target

    ff56dd9854721b5e0e7b6d2a5622d91c46963012d9da3c4c4b13b650a97c3b10.exe

  • Size

    228KB

  • MD5

    0e5891df55c3e762dd943e1e7581c56b

  • SHA1

    94c82ea2f424aa96acff75980d50f4c341e005a6

  • SHA256

    ff56dd9854721b5e0e7b6d2a5622d91c46963012d9da3c4c4b13b650a97c3b10

  • SHA512

    2318f454fe5837fe6a17cf433a13e3f31ae9b9945ad508e8071db9389cec6d673730608d54969634124d0c141ebbc28e3a287bb68953283cd296ef49636075b3

  • SSDEEP

    3072:uZQXhtpiO76f474Sx+0IO/5BJB1bfigTHfhzqcuB2YsM0N:uZSviO76f47k7c5vtLfhzn

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff56dd9854721b5e0e7b6d2a5622d91c46963012d9da3c4c4b13b650a97c3b10.exe
    "C:\Users\Admin\AppData\Local\Temp\ff56dd9854721b5e0e7b6d2a5622d91c46963012d9da3c4c4b13b650a97c3b10.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\qfkueb.exe
      "C:\Users\Admin\qfkueb.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qfkueb.exe

    Filesize

    228KB

    MD5

    bc37b1d896f4822e68314599ca510b7d

    SHA1

    367ebed798bc53ff63d4002f862e186208316064

    SHA256

    1e755cbd830aa8efe420344bf532ce4b27712b7b5324a737d3a189df02de220f

    SHA512

    b89502963f0703d25c9287b013d2d404c2d58803e0bcd18bd3c01c9d74753b495021dc130211f58084861c2b1fd959fa6b979c9f9654b82f8f2692f5fb118c33

  • C:\Users\Admin\qfkueb.exe

    Filesize

    228KB

    MD5

    bc37b1d896f4822e68314599ca510b7d

    SHA1

    367ebed798bc53ff63d4002f862e186208316064

    SHA256

    1e755cbd830aa8efe420344bf532ce4b27712b7b5324a737d3a189df02de220f

    SHA512

    b89502963f0703d25c9287b013d2d404c2d58803e0bcd18bd3c01c9d74753b495021dc130211f58084861c2b1fd959fa6b979c9f9654b82f8f2692f5fb118c33