Analysis

  • max time kernel
    176s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2022 00:55

General

  • Target

    350a9675632afa1f5cc1e3020bdc14b80be45211dfeb22d8f5c1dd02938f6044.exe

  • Size

    116KB

  • MD5

    0dcdb3a977340994498a536502b4bb50

  • SHA1

    c89bcd4f4e7b68bf87a5bdedc93a733bf07ff394

  • SHA256

    350a9675632afa1f5cc1e3020bdc14b80be45211dfeb22d8f5c1dd02938f6044

  • SHA512

    590aa020a45e03a1de4896fbdc1729139acfffc567efd26f79a3d88364f2fe3aa70bfa89dda06e4f50f1a44b5a5a00ead86f214bf250f5ec84300e660fa9c04d

  • SSDEEP

    1536:ZPB3h6XVQkT/3fs8koyFFx57Yj3oJoFDuhQHy4ktWq:RJQlQavfMLEj3oJoAhayWq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\350a9675632afa1f5cc1e3020bdc14b80be45211dfeb22d8f5c1dd02938f6044.exe
    "C:\Users\Admin\AppData\Local\Temp\350a9675632afa1f5cc1e3020bdc14b80be45211dfeb22d8f5c1dd02938f6044.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3416
    • C:\Users\Admin\xiyaz.exe
      "C:\Users\Admin\xiyaz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4124

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xiyaz.exe

    Filesize

    116KB

    MD5

    273e0fcb32b9e167a5bafc6ae69a1a8f

    SHA1

    50dd860eabc7307e6709268b7b341233f8604eba

    SHA256

    2c0bb994cbb97e9111d55cba0b5af3f5a290e1b2d762d29dddf5264f331c7f00

    SHA512

    b8c7ee8edab6b8ca31f1499e8fba7d37206475ae44a27d963062015ed5785e38d6d41188ba9599e8bb96387316a235a7934150dfc59173d79fb8d84cf25e16c3

  • C:\Users\Admin\xiyaz.exe

    Filesize

    116KB

    MD5

    273e0fcb32b9e167a5bafc6ae69a1a8f

    SHA1

    50dd860eabc7307e6709268b7b341233f8604eba

    SHA256

    2c0bb994cbb97e9111d55cba0b5af3f5a290e1b2d762d29dddf5264f331c7f00

    SHA512

    b8c7ee8edab6b8ca31f1499e8fba7d37206475ae44a27d963062015ed5785e38d6d41188ba9599e8bb96387316a235a7934150dfc59173d79fb8d84cf25e16c3