Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:54

General

  • Target

    ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe

  • Size

    248KB

  • MD5

    444d47ed94e03a1c113693f4744f1535

  • SHA1

    9d177c60003dec53e914820ccbda24a39299c882

  • SHA256

    ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785

  • SHA512

    b1f1b4387d5deeef65162ea6a9becf24be7c9313419621ec74b8302107f1bafeb1c42d624d97c36948ce8da4d07dc996e3ecaead3434e727e23e6730ad54bcb1

  • SSDEEP

    3072:8KS3nulFtcOVH7L0+/RBRgll5lb5zG5L+fk:8DnuhTNGl5Hh8

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe
    "C:\Users\Admin\AppData\Local\Temp\ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Users\Admin\haeiqen.exe
      "C:\Users\Admin\haeiqen.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\haeiqen.exe

    Filesize

    248KB

    MD5

    c8528201513a7fded80cb3678d99565b

    SHA1

    b3fb4561bda285e9b7bd99f39fed15b9f336b773

    SHA256

    59e29551ed8dcf4130b023cec5fa6ff18f5b1910059a8dd37ea4d61cf9dc283a

    SHA512

    009b14ae2d20977b1dd5feeacb804b31b083162b7f14c0c79ce7148cf883ce78500dddd1a959518550b3f8529f3aa3a784231d061a51c945108924e7cfc0029a

  • C:\Users\Admin\haeiqen.exe

    Filesize

    248KB

    MD5

    c8528201513a7fded80cb3678d99565b

    SHA1

    b3fb4561bda285e9b7bd99f39fed15b9f336b773

    SHA256

    59e29551ed8dcf4130b023cec5fa6ff18f5b1910059a8dd37ea4d61cf9dc283a

    SHA512

    009b14ae2d20977b1dd5feeacb804b31b083162b7f14c0c79ce7148cf883ce78500dddd1a959518550b3f8529f3aa3a784231d061a51c945108924e7cfc0029a

  • memory/440-134-0x0000000000000000-mapping.dmp