Analysis

  • max time kernel
    165s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 15:21

General

  • Target

    2c81cf7e7dac0610ca081184820de65e41b63df503cd2b24db20b4a87da57609.exe

  • Size

    260KB

  • MD5

    0ed0b1c97ca9cc796891b36ee36b18c9

  • SHA1

    92d52e24213e667c435ac6569880a3fd6530c8b4

  • SHA256

    2c81cf7e7dac0610ca081184820de65e41b63df503cd2b24db20b4a87da57609

  • SHA512

    712188ffb5bd7af026d1f5d2960af5db539d63f3944a103e181a631f6672d60d9d8d2af915aa1131d8cf3bc5b1c57a44aca6294dcc49b467557d6091600d9fd2

  • SSDEEP

    3072:vgfAlNLvh25n/kZoSUjMqXnpWAkpAmTSrMaIOYt/jo7LAtPhjjtZnfHFEoWBfGVy:vdSgTSrMaIl/jcLijfHFEHWzXvjT85R

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c81cf7e7dac0610ca081184820de65e41b63df503cd2b24db20b4a87da57609.exe
    "C:\Users\Admin\AppData\Local\Temp\2c81cf7e7dac0610ca081184820de65e41b63df503cd2b24db20b4a87da57609.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\weidiq.exe
      "C:\Users\Admin\weidiq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\weidiq.exe

    Filesize

    260KB

    MD5

    07e52793eecab142aceddf64aae4c4fa

    SHA1

    e963f7190fe7498ac19ebf9c99f9412d7cf64d80

    SHA256

    269039257ccfb8794197429052394a963e0342426b3ca7a655f8f56cf4ee7c7e

    SHA512

    29b9a26db9282ed39d1e687a794e0b93773e93b7533afc34c664eb6d2fb698c2970a1c0bdd0ea8077ce2fcf8535b8972d6acf6f75c92ff55eb2e4d0a8116adef

  • C:\Users\Admin\weidiq.exe

    Filesize

    260KB

    MD5

    07e52793eecab142aceddf64aae4c4fa

    SHA1

    e963f7190fe7498ac19ebf9c99f9412d7cf64d80

    SHA256

    269039257ccfb8794197429052394a963e0342426b3ca7a655f8f56cf4ee7c7e

    SHA512

    29b9a26db9282ed39d1e687a794e0b93773e93b7533afc34c664eb6d2fb698c2970a1c0bdd0ea8077ce2fcf8535b8972d6acf6f75c92ff55eb2e4d0a8116adef