Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 09:49

General

  • Target

    ab6c11536470b42905455a46147539b047dbb207ba8ba0eebee730c1a2d5ea49.exe

  • Size

    191KB

  • MD5

    1e912d9f76b2f03272ebbd8df1aff8f3

  • SHA1

    d0a844a162950a3c9e150fc8f3a09cda0af3b489

  • SHA256

    ab6c11536470b42905455a46147539b047dbb207ba8ba0eebee730c1a2d5ea49

  • SHA512

    1ae459b28811503cda211a819e624c557412f55426fc0c436251e8aa3b0d2b5ce8d11a09acc288c78580728f3af63f696680215954b578fdb4aca8ea51999dd3

  • SSDEEP

    3072:HADWbKzKbQmSVdSme+xmJyD4BliqzsmmEpEmboQd+ccewkyeZyYPuvGCJ30EZ0d6:HAVySV1eY4k437d+4wkTHdS2y

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab6c11536470b42905455a46147539b047dbb207ba8ba0eebee730c1a2d5ea49.exe
    "C:\Users\Admin\AppData\Local\Temp\ab6c11536470b42905455a46147539b047dbb207ba8ba0eebee730c1a2d5ea49.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    PID:5048

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads