Analysis

  • max time kernel
    190s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 17:28

General

  • Target

    ae6107ae766f4a3813f3746f3769084dbeed7106335d99532b0b171574fb3fe8.exe

  • Size

    80KB

  • MD5

    0af6965d6706786312d35046024042f1

  • SHA1

    75a98a428daef6387eb617a32d16742d912758bb

  • SHA256

    ae6107ae766f4a3813f3746f3769084dbeed7106335d99532b0b171574fb3fe8

  • SHA512

    06d4b6aee1c68d50408ea484663820081b2cc00540a45bf7cf764649471ce9b8adbef40e026716785b1fa79372d4886bc9088ee4ea0f0c64f96a1a32c26fb220

  • SSDEEP

    768:ev6nMfqgG4sOm0KUc8ebdtF5EmpW/p/hxRSH9NxIkL9v/Q6sWT:evTsTZKmpSFhxRSHdL9bsi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae6107ae766f4a3813f3746f3769084dbeed7106335d99532b0b171574fb3fe8.exe
    "C:\Users\Admin\AppData\Local\Temp\ae6107ae766f4a3813f3746f3769084dbeed7106335d99532b0b171574fb3fe8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\rjmol.exe
      "C:\Users\Admin\rjmol.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4560
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 1480
      2⤵
      • Program crash
      PID:1968
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2132 -ip 2132
    1⤵
      PID:620

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\rjmol.exe

            Filesize

            80KB

            MD5

            6edc7aa6e7322990ddc4aa9fe8757f0f

            SHA1

            124929b8403ffd8bffcfd6279a96d46add441f28

            SHA256

            76be0fd0734e28955f81d5c92d3f63ad52e347e8b27800b1ddaf81a13685b5d2

            SHA512

            7f09b833db3dd1d2f6fdf1b0b285318640bfa69150778b993baf3dc0ce53e67e29133933959bffc80ecb8d74adc59a6fe09223e58619be59ae08ff53a26066fe

          • C:\Users\Admin\rjmol.exe

            Filesize

            80KB

            MD5

            6edc7aa6e7322990ddc4aa9fe8757f0f

            SHA1

            124929b8403ffd8bffcfd6279a96d46add441f28

            SHA256

            76be0fd0734e28955f81d5c92d3f63ad52e347e8b27800b1ddaf81a13685b5d2

            SHA512

            7f09b833db3dd1d2f6fdf1b0b285318640bfa69150778b993baf3dc0ce53e67e29133933959bffc80ecb8d74adc59a6fe09223e58619be59ae08ff53a26066fe