Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 20:48

General

  • Target

    b2f3a078674866c8feb7a0cd70a5046e70260a3f518642267641f48380d22968.exe

  • Size

    224KB

  • MD5

    0d4e296ded5c3bac797b64ea5ef402c9

  • SHA1

    49ae96f776ebd96815c028bcf773a88a3d75cb0f

  • SHA256

    b2f3a078674866c8feb7a0cd70a5046e70260a3f518642267641f48380d22968

  • SHA512

    8b8afb589037f065a58174b08bc015535035060062b428e130b4ed2e2bd126b53976f863c487d356e1b8ae30c2eb20db973118254d4640884b1dab3cc4d301d4

  • SSDEEP

    3072:8XyqNsMoBuiZZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax26:DqN5Wp4LnbmlrZW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2f3a078674866c8feb7a0cd70a5046e70260a3f518642267641f48380d22968.exe
    "C:\Users\Admin\AppData\Local\Temp\b2f3a078674866c8feb7a0cd70a5046e70260a3f518642267641f48380d22968.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\smvuid.exe
      "C:\Users\Admin\smvuid.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\smvuid.exe

    Filesize

    224KB

    MD5

    ebad92d1562a6ad8ff3d55995667d19d

    SHA1

    b20cf5df4c4462515862806dbdd323ba6c9dc238

    SHA256

    d099735538b1ac631a31d49010964ac1655997daad1df5f6d0c4cad8d45575a2

    SHA512

    83d0ccc927716b9cd7b4034bb6cbdfb7e05d707d10973fa4c06d6015debaea42d267ec367aa082b380caa4707ec2655be1150335ed1c91489c083b9ddb7f9b3e

  • C:\Users\Admin\smvuid.exe

    Filesize

    224KB

    MD5

    ebad92d1562a6ad8ff3d55995667d19d

    SHA1

    b20cf5df4c4462515862806dbdd323ba6c9dc238

    SHA256

    d099735538b1ac631a31d49010964ac1655997daad1df5f6d0c4cad8d45575a2

    SHA512

    83d0ccc927716b9cd7b4034bb6cbdfb7e05d707d10973fa4c06d6015debaea42d267ec367aa082b380caa4707ec2655be1150335ed1c91489c083b9ddb7f9b3e