Analysis

  • max time kernel
    158s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 16:26

General

  • Target

    84aa785e80de617c73c4290e5d1f17c960c1c5aa3a8d4046810051a994f5aaa6.exe

  • Size

    172KB

  • MD5

    0f56c773c3d192eceaa32b6f25607701

  • SHA1

    23846adf8e340deb11c12c24088828b0f957f8c5

  • SHA256

    84aa785e80de617c73c4290e5d1f17c960c1c5aa3a8d4046810051a994f5aaa6

  • SHA512

    34a0d9210e4d3a0a5b9522cc0def51bd9cd31517d0d655f3e5404597799feb46c05dce643ee76e030ee36d4af2d2973354116b76fce7986f3e23aa5874e9fede

  • SSDEEP

    768:XG8CRCvbHa5ED3Y9gMtVAcfvreLHAIkuqmuRZuFcPAXHo:XWiY9X6LH9kuqmuvUcPAXI

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84aa785e80de617c73c4290e5d1f17c960c1c5aa3a8d4046810051a994f5aaa6.exe
    "C:\Users\Admin\AppData\Local\Temp\84aa785e80de617c73c4290e5d1f17c960c1c5aa3a8d4046810051a994f5aaa6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Users\Admin\toiagoq.exe
      "C:\Users\Admin\toiagoq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\toiagoq.exe

    Filesize

    172KB

    MD5

    8252ec2e36ebc9da02df4593e5228108

    SHA1

    8ca1379de6f9d443596d945638ab1c197b84c91b

    SHA256

    2a7f873eaefa72174002419d34a5c3df76a00a3a4f68ebd1001e1c7321b8800f

    SHA512

    649969260d8962da2170686417184ccea08b7427adaa4afa9133ddd6148e466ca9560a5ce684f2718189243b146b257b285225d527620ab0f4aeafc769742f09

  • C:\Users\Admin\toiagoq.exe

    Filesize

    172KB

    MD5

    8252ec2e36ebc9da02df4593e5228108

    SHA1

    8ca1379de6f9d443596d945638ab1c197b84c91b

    SHA256

    2a7f873eaefa72174002419d34a5c3df76a00a3a4f68ebd1001e1c7321b8800f

    SHA512

    649969260d8962da2170686417184ccea08b7427adaa4afa9133ddd6148e466ca9560a5ce684f2718189243b146b257b285225d527620ab0f4aeafc769742f09