Analysis

  • max time kernel
    153s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:50

General

  • Target

    3d5cd7abb7a366ab2bd7fa19512b5e5cfb606a9d2405bee5262c3cecd1e421dc.exe

  • Size

    252KB

  • MD5

    4ac1afd1d94d25e4495c8290591f4020

  • SHA1

    fbaed259b8a0a3ee435fe8b5a307aa14fb2b7c2a

  • SHA256

    3d5cd7abb7a366ab2bd7fa19512b5e5cfb606a9d2405bee5262c3cecd1e421dc

  • SHA512

    88da364ef35092c553698f7fa8dd6c8439198c875e19b9a1c1410e4196e42cbc06987bc67620ee5d63e9c35b6d105227bf4eeda6aa3d18e06f8b08f7e26600cc

  • SSDEEP

    3072:grAc+x7LaShsNvZ0OgRqTAJcLGGO/xuiEyJeOOeGs5oxnkNzQKtjQx:grghCx/ZLA4PmG6dK

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d5cd7abb7a366ab2bd7fa19512b5e5cfb606a9d2405bee5262c3cecd1e421dc.exe
    "C:\Users\Admin\AppData\Local\Temp\3d5cd7abb7a366ab2bd7fa19512b5e5cfb606a9d2405bee5262c3cecd1e421dc.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\jeairu.exe
      "C:\Users\Admin\jeairu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jeairu.exe

    Filesize

    252KB

    MD5

    b47a33e49e080043251db5252ecc74e1

    SHA1

    5b362578f228eec838a5eddc098845dd824705b1

    SHA256

    fddc2d599ca996acabe64a11bee5f0d90d9783eda91f52f647b8e0b0109f4340

    SHA512

    75de8111a4e5ab22c622bab3cbeca02dd45321e39c59beb415779edb4e6d42455313333aeb952f1c626677970ca51b8c053f8192a4b8263e929b68fb7aefba74

  • C:\Users\Admin\jeairu.exe

    Filesize

    252KB

    MD5

    b47a33e49e080043251db5252ecc74e1

    SHA1

    5b362578f228eec838a5eddc098845dd824705b1

    SHA256

    fddc2d599ca996acabe64a11bee5f0d90d9783eda91f52f647b8e0b0109f4340

    SHA512

    75de8111a4e5ab22c622bab3cbeca02dd45321e39c59beb415779edb4e6d42455313333aeb952f1c626677970ca51b8c053f8192a4b8263e929b68fb7aefba74

  • memory/1832-134-0x0000000000000000-mapping.dmp