Analysis

  • max time kernel
    152s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 15:22

General

  • Target

    808c745f87cbe60b1c255c83ef7d34830ec271e8906a28e5acb7a644cf1be654.exe

  • Size

    256KB

  • MD5

    04c129b6db906ebd3bd37aa23af55991

  • SHA1

    94c9d19fe6e52f3c82af5d26fc754fa36fae33d7

  • SHA256

    808c745f87cbe60b1c255c83ef7d34830ec271e8906a28e5acb7a644cf1be654

  • SHA512

    3cdec19644502f679732ee1701e4a037ad52c137e4d89d54d958a4d6a8f127b8786d8b586f856fc637d46505f8cad8a4c74f3843afbca32b101150029346e7f6

  • SSDEEP

    3072:k3ZVoeI0Plp/nskpCUv5T79fzCC/M7BFsqMabeYiUDoZGA33ygoe:yfxPlptNvl9fm0UBFsqMabeYiUDogmFv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\808c745f87cbe60b1c255c83ef7d34830ec271e8906a28e5acb7a644cf1be654.exe
    "C:\Users\Admin\AppData\Local\Temp\808c745f87cbe60b1c255c83ef7d34830ec271e8906a28e5acb7a644cf1be654.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Users\Admin\xuioq.exe
      "C:\Users\Admin\xuioq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5032

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\xuioq.exe

          Filesize

          256KB

          MD5

          5a3fb182c92b9f338398e0f881168207

          SHA1

          dca0ab0bb7037aad087712a795bc092fd3aa91ba

          SHA256

          c23fc753d38f5e90c4724b7d42f8c9efca81b305e5146298856c28a19c4cafdb

          SHA512

          25efdd1649a4160a8ced0ca1950fae65cd14fd5dcad21a84c62b45a97d9b5181ab59f4a47c43358b129b812647f5e445906dda5ebf8c00cdd000ea4947f516a5

        • C:\Users\Admin\xuioq.exe

          Filesize

          256KB

          MD5

          5a3fb182c92b9f338398e0f881168207

          SHA1

          dca0ab0bb7037aad087712a795bc092fd3aa91ba

          SHA256

          c23fc753d38f5e90c4724b7d42f8c9efca81b305e5146298856c28a19c4cafdb

          SHA512

          25efdd1649a4160a8ced0ca1950fae65cd14fd5dcad21a84c62b45a97d9b5181ab59f4a47c43358b129b812647f5e445906dda5ebf8c00cdd000ea4947f516a5