Analysis

  • max time kernel
    186s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:24

General

  • Target

    49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe

  • Size

    60KB

  • MD5

    be57bf494559581a52e67b35a994eee4

  • SHA1

    8784613380e22a72cf9e8404cf2562a4b5b36f1e

  • SHA256

    49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102

  • SHA512

    f6cbdacad846794a44449b0e858baf7a0befb5a7f8d47eba40474b9013955ade77d6080241cf18a899ad0e639f2badfd73f1402210a2706cd425d3ce5ff00a01

  • SSDEEP

    1536:Q/GRyei2Bso+gU7aG57rZifwFODTnF/w12TFZ9jDSN:bi2Bs0U7ZZ0wFch/w12TzgN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe
    "C:\Users\Admin\AppData\Local\Temp\49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\.exe
      "C:\Users\Admin\.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\.exe

    Filesize

    60KB

    MD5

    04515d8289148d2f124db2edc5ab02fd

    SHA1

    4b5531958db615006771976173e868b185010a77

    SHA256

    99d083513ef8dceb97abed81b4141ab274b50d9eecf4468dddf66461b38cf12e

    SHA512

    6676feda0889ba9f42c1c1219a77989a02db1b6f385be61a134306e95e979f52f9910a5a4e2c6e6e780eedd9cbd0a463c1983e682e42a70ce7ccc290f6b705a1

  • C:\Users\Admin\.exe

    Filesize

    60KB

    MD5

    04515d8289148d2f124db2edc5ab02fd

    SHA1

    4b5531958db615006771976173e868b185010a77

    SHA256

    99d083513ef8dceb97abed81b4141ab274b50d9eecf4468dddf66461b38cf12e

    SHA512

    6676feda0889ba9f42c1c1219a77989a02db1b6f385be61a134306e95e979f52f9910a5a4e2c6e6e780eedd9cbd0a463c1983e682e42a70ce7ccc290f6b705a1

  • memory/4916-134-0x0000000000000000-mapping.dmp