Analysis

  • max time kernel
    151s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 16:41

General

  • Target

    12548c3140d21446896e15a5188768999a7a895b6cd25136b51203598d241bd9.exe

  • Size

    280KB

  • MD5

    4c224ca41d035e3c79e59aed857a1ec0

  • SHA1

    9e4bc1c0a0c8d6de72d6bb53d20acfb75555acee

  • SHA256

    12548c3140d21446896e15a5188768999a7a895b6cd25136b51203598d241bd9

  • SHA512

    07e9e133d472f8947b250b913d351dafc32bf7ae2830480f624fd2dcf0ec91d9f43148fcbd8f251c5dbfd427fb63efc10fc7c8e11de1f32c76a714ee9a00ef32

  • SSDEEP

    3072:IaZFviHOPiu8aQe3TqDUCiGjHJDbRv9y+qwa+rZf/M2BXOg:1FviHOf3TqD+0HBb5ta+rZ3Mat

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12548c3140d21446896e15a5188768999a7a895b6cd25136b51203598d241bd9.exe
    "C:\Users\Admin\AppData\Local\Temp\12548c3140d21446896e15a5188768999a7a895b6cd25136b51203598d241bd9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Users\Admin\jouoqay.exe
      "C:\Users\Admin\jouoqay.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jouoqay.exe

    Filesize

    280KB

    MD5

    62cba453b9bcf81fc6492db1fa3e7fb9

    SHA1

    2682de85a98491d87b4128c9d5964ec39ebc0043

    SHA256

    870711f06c41367c9a6f066c81569cdc3e6d7041ecd4a2dde9de0cc6b97808e7

    SHA512

    81ec5cbac9e5cf9f0daa53915256463a02b131b9137967519ea2ceef05af17c91750aa39f389a5ea5a4f1746a1b075323cc1270c2479bec595e3dae1802099fd

  • C:\Users\Admin\jouoqay.exe

    Filesize

    280KB

    MD5

    62cba453b9bcf81fc6492db1fa3e7fb9

    SHA1

    2682de85a98491d87b4128c9d5964ec39ebc0043

    SHA256

    870711f06c41367c9a6f066c81569cdc3e6d7041ecd4a2dde9de0cc6b97808e7

    SHA512

    81ec5cbac9e5cf9f0daa53915256463a02b131b9137967519ea2ceef05af17c91750aa39f389a5ea5a4f1746a1b075323cc1270c2479bec595e3dae1802099fd

  • memory/1748-134-0x0000000000000000-mapping.dmp