Analysis

  • max time kernel
    153s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:07

General

  • Target

    b416f056b785369f304b51c0dfa06607898f85bcdd90e9dc4de9ac9769fa2efd.exe

  • Size

    288KB

  • MD5

    52df055864a09f85eff8d58b60c9a650

  • SHA1

    157810f9a7d5d270e04c534ac7999e201c4fdb55

  • SHA256

    b416f056b785369f304b51c0dfa06607898f85bcdd90e9dc4de9ac9769fa2efd

  • SHA512

    ec5dbf7e69a6ca40d72544fb220fb1c63e7f294660de8c99f5c794d2a8f242734393127302884219ba5aa9d7020d3d56f96459d98f9144f6dbd9c79aaf9b1acb

  • SSDEEP

    6144:kXTAUr1e9d4c+Q+lafeafT2Jt2tFQJSqCTaX/c9AC:oJ8XM9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b416f056b785369f304b51c0dfa06607898f85bcdd90e9dc4de9ac9769fa2efd.exe
    "C:\Users\Admin\AppData\Local\Temp\b416f056b785369f304b51c0dfa06607898f85bcdd90e9dc4de9ac9769fa2efd.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Users\Admin\hwmeb.exe
      "C:\Users\Admin\hwmeb.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1560

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hwmeb.exe
    Filesize

    288KB

    MD5

    27122e2d7075518ebbd83febaa527525

    SHA1

    4df11f8ace05c3303cb65382c6afad0d7646d988

    SHA256

    b878adffaa3f6ea19171d02a74d6e913ef49b9581e1be3dd1f3c42791cfc3dcb

    SHA512

    a9d34f23f79258bac3e4285c7d58c3f773dfb4ca30a3700237c48b553d657beb5adc340ace929255af0767bd06808cd163755a3103773a1575f6bda70928ceaa

  • C:\Users\Admin\hwmeb.exe
    Filesize

    288KB

    MD5

    27122e2d7075518ebbd83febaa527525

    SHA1

    4df11f8ace05c3303cb65382c6afad0d7646d988

    SHA256

    b878adffaa3f6ea19171d02a74d6e913ef49b9581e1be3dd1f3c42791cfc3dcb

    SHA512

    a9d34f23f79258bac3e4285c7d58c3f773dfb4ca30a3700237c48b553d657beb5adc340ace929255af0767bd06808cd163755a3103773a1575f6bda70928ceaa

  • memory/1560-134-0x0000000000000000-mapping.dmp