Analysis

  • max time kernel
    157s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2022 16:33

General

  • Target

    4f0ecb5fa787618aeec2105daba6f905c400a65e893c1326efacd1c6c68f6a2c.exe

  • Size

    284KB

  • MD5

    0d0aaa93658b9966a2876889a3d93116

  • SHA1

    53194c21bf0f1f987d7cee49e22d49151eb5b9b7

  • SHA256

    4f0ecb5fa787618aeec2105daba6f905c400a65e893c1326efacd1c6c68f6a2c

  • SHA512

    a537cb92082783b713e65395d85a416643452dce23aabf0ca0c7b93ffbc9459056cd875dde12f8253bbd8b45b26da5197c6bb3f442230e3581f42a6a3e95a8b6

  • SSDEEP

    3072:q0A2afa1Abn4DpS41Zr8EbjfmNwXl1RgxfGDP8F2dqMOkeuF7SzoqJBX:5ay1Az4Dp7R8cA0l1RpLtJj7Sk4

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f0ecb5fa787618aeec2105daba6f905c400a65e893c1326efacd1c6c68f6a2c.exe
    "C:\Users\Admin\AppData\Local\Temp\4f0ecb5fa787618aeec2105daba6f905c400a65e893c1326efacd1c6c68f6a2c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\wauije.exe
      "C:\Users\Admin\wauije.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4328

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wauije.exe

    Filesize

    284KB

    MD5

    593b4081e2a0dea37dc1c4b4770676ef

    SHA1

    18e881788dc6bf809933c253f1aae527c0225693

    SHA256

    2a91cc855b2747cab3df4173ffdad578d1f8f67ce289b1f94907b058b2ac25d4

    SHA512

    3d33fc83a9244d06b19bc24178b3da99d61c8d08048619972f4920b9d7ea987a25d5ba7c611d5883b7ad02838d8a2ee29f526cdcb899ad9b762df0bf46da8492

  • C:\Users\Admin\wauije.exe

    Filesize

    284KB

    MD5

    593b4081e2a0dea37dc1c4b4770676ef

    SHA1

    18e881788dc6bf809933c253f1aae527c0225693

    SHA256

    2a91cc855b2747cab3df4173ffdad578d1f8f67ce289b1f94907b058b2ac25d4

    SHA512

    3d33fc83a9244d06b19bc24178b3da99d61c8d08048619972f4920b9d7ea987a25d5ba7c611d5883b7ad02838d8a2ee29f526cdcb899ad9b762df0bf46da8492

  • memory/4328-134-0x0000000000000000-mapping.dmp