Analysis

  • max time kernel
    152s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 16:50

General

  • Target

    de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe

  • Size

    248KB

  • MD5

    5d9265c93ee17a13e82279b744af251c

  • SHA1

    ec01ba3f8cccbcdab51d9a3e070cbd8f4a68fd35

  • SHA256

    de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d

  • SHA512

    f4a81a5ec450108efb062d169de83417eded90e4502866e60b998235d844c2eb8d1820baf68875ef573e5bef95bc6fde83f035d206bc7250eeba8a655c7343b0

  • SSDEEP

    6144:NxpM5CElofkFWQPtnRneqAKnvmb7/D269fgwMty0e6ndv0D:NU5CLkFfnRnWKnvmb7/D26qndv0D

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe
    "C:\Users\Admin\AppData\Local\Temp\de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\slraz.exe
      "C:\Users\Admin\slraz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4396

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\slraz.exe

    Filesize

    248KB

    MD5

    e0c5ee5f7f9a3ecb7e204801d3c9b039

    SHA1

    e57148cc8827d9eada421383b02a0e21c4dae590

    SHA256

    baf8b81f69b86c3667f41500b48f672b11c784803bea18836148c0dda5f7348e

    SHA512

    98509441c814147c9267633bc9e089c82e497ccc502c90c6bedeab3d0e03fc6a9be4dd1dd1c9617c3efc3d5be0ce28b3b0980561948cf2fcccb3599d0bd8f7a1

  • C:\Users\Admin\slraz.exe

    Filesize

    248KB

    MD5

    e0c5ee5f7f9a3ecb7e204801d3c9b039

    SHA1

    e57148cc8827d9eada421383b02a0e21c4dae590

    SHA256

    baf8b81f69b86c3667f41500b48f672b11c784803bea18836148c0dda5f7348e

    SHA512

    98509441c814147c9267633bc9e089c82e497ccc502c90c6bedeab3d0e03fc6a9be4dd1dd1c9617c3efc3d5be0ce28b3b0980561948cf2fcccb3599d0bd8f7a1

  • memory/4396-134-0x0000000000000000-mapping.dmp