Analysis
-
max time kernel
133s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 22:47
Static task
static1
Behavioral task
behavioral1
Sample
41fdfd031adb76d34e521b45c8d11c66f108377dc74541506a1affb7e3e9293f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
41fdfd031adb76d34e521b45c8d11c66f108377dc74541506a1affb7e3e9293f.exe
Resource
win10v2004-20220812-en
General
-
Target
41fdfd031adb76d34e521b45c8d11c66f108377dc74541506a1affb7e3e9293f.exe
-
Size
307KB
-
MD5
35a7c263b31cb4e4715a042ba7ca61a8
-
SHA1
7b808b5ee7c5c7f8f29654bcc1356f5e12b89233
-
SHA256
41fdfd031adb76d34e521b45c8d11c66f108377dc74541506a1affb7e3e9293f
-
SHA512
2849f6040c867c72cd5f57958d016321490860781913b78cd22b4f2e9b63fa6f1e5f61e7f51656d4af5bf09c8b7ebfd3f6cd8d75a123129e74ae585d62eab57d
-
SSDEEP
6144:nRArZFpZj0+QTyBzPJVLo4JmqGM39IHtp8ZH1kWeJ85zQ9s+xMb:y5TQmrlDHOsk/UzAs+xMb
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pika.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts pika.exe -
Executes dropped EXE 1 IoCs
pid Process 2352 pika.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 41fdfd031adb76d34e521b45c8d11c66f108377dc74541506a1affb7e3e9293f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Windows" pika.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2352 pika.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2352 pika.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4060 wrote to memory of 2352 4060 41fdfd031adb76d34e521b45c8d11c66f108377dc74541506a1affb7e3e9293f.exe 80 PID 4060 wrote to memory of 2352 4060 41fdfd031adb76d34e521b45c8d11c66f108377dc74541506a1affb7e3e9293f.exe 80 PID 4060 wrote to memory of 2352 4060 41fdfd031adb76d34e521b45c8d11c66f108377dc74541506a1affb7e3e9293f.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\41fdfd031adb76d34e521b45c8d11c66f108377dc74541506a1affb7e3e9293f.exe"C:\Users\Admin\AppData\Local\Temp\41fdfd031adb76d34e521b45c8d11c66f108377dc74541506a1affb7e3e9293f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\pika.exe"C:\Users\Admin\AppData\Local\Temp\pika.exe"2⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD599b9c3af1ec473e750a3b15a1d5d40d6
SHA16c0d7ef5cbfc5433948256042ff90b822d162ad0
SHA2564311ffef5a59289c806602cac22d0f97eab22213a1eaa2d1bd36ab273655933f
SHA512097a18b3eaddd2812a01f9cf448a25f96d2b1f2027aeadda92d5c42a4113a9de5127124513737532c02a2cc6d9ca9d33d5e9d32bfcc2e73fbb1285ed014c0951
-
Filesize
64KB
MD599b9c3af1ec473e750a3b15a1d5d40d6
SHA16c0d7ef5cbfc5433948256042ff90b822d162ad0
SHA2564311ffef5a59289c806602cac22d0f97eab22213a1eaa2d1bd36ab273655933f
SHA512097a18b3eaddd2812a01f9cf448a25f96d2b1f2027aeadda92d5c42a4113a9de5127124513737532c02a2cc6d9ca9d33d5e9d32bfcc2e73fbb1285ed014c0951