Analysis

  • max time kernel
    158s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:57

General

  • Target

    c70b0e90be88882c3fb7e2ceee54c1314f8fd2c3213c2b29ceb9555acea3c6df.exe

  • Size

    184KB

  • MD5

    52616d239c0a3bacef695459e7f3449c

  • SHA1

    9525cf92e6b3bfbbe1109a195eea97af0fa380df

  • SHA256

    c70b0e90be88882c3fb7e2ceee54c1314f8fd2c3213c2b29ceb9555acea3c6df

  • SHA512

    40ede96ea3248c9ca6d2ebcb417bec428845cbb537e849a4bf5151f5c181df07b6d49f10df5bde09926b1b92e7e4e3655085e323a06af234d6a2d3e4f723cb2a

  • SSDEEP

    3072:30FEOW7fEQVdXpAxTIfJyX33RPvSk8g0gVTRj:30P2Zd5ARIfA3lvStgtV

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c70b0e90be88882c3fb7e2ceee54c1314f8fd2c3213c2b29ceb9555acea3c6df.exe
    "C:\Users\Admin\AppData\Local\Temp\c70b0e90be88882c3fb7e2ceee54c1314f8fd2c3213c2b29ceb9555acea3c6df.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Users\Admin\lbyiiq.exe
      "C:\Users\Admin\lbyiiq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lbyiiq.exe

    Filesize

    184KB

    MD5

    d366068e3e1999e6108cb93a1271960f

    SHA1

    a157eca818523ed37af8325750e523fb83627f6b

    SHA256

    da2b14e57218550d3b5138bb113e5c3c6676186969d1a5bfb780a6c370885560

    SHA512

    110cf0c58d9a556dc4e6ab542b1ad2d1ab695b54152475e5ab41522c3e10c2e1021b6e608779d6eeb34897e8620b2e3f6c100e01a3e44945e3272fe62ce16337

  • C:\Users\Admin\lbyiiq.exe

    Filesize

    184KB

    MD5

    d366068e3e1999e6108cb93a1271960f

    SHA1

    a157eca818523ed37af8325750e523fb83627f6b

    SHA256

    da2b14e57218550d3b5138bb113e5c3c6676186969d1a5bfb780a6c370885560

    SHA512

    110cf0c58d9a556dc4e6ab542b1ad2d1ab695b54152475e5ab41522c3e10c2e1021b6e608779d6eeb34897e8620b2e3f6c100e01a3e44945e3272fe62ce16337

  • memory/724-134-0x0000000000000000-mapping.dmp