Analysis

  • max time kernel
    152s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:06

General

  • Target

    b19d49901abd80afa963c45e08cc6f34cb28c715fd9082256474c93d2bff4361.exe

  • Size

    128KB

  • MD5

    5ff1dfa3e99499031ce8b416633c8cc0

  • SHA1

    c5788fa88c87094e2eb2dbc58308a35da89967e5

  • SHA256

    b19d49901abd80afa963c45e08cc6f34cb28c715fd9082256474c93d2bff4361

  • SHA512

    4bf288184df11390f5b06ec922c3ecf2b23f17fd8854a720c87d1cb15eebb6edfbcc729b3bdcc678b8dbb4e199cd75a6b9a0219b7a60a2b50493e3f0b9f515a2

  • SSDEEP

    1536:idusiAhgIuFQFvHwd6PXOYb7gXWgWKsEHTINeG0h/E:Susiqg/FQByYb7gvsEzM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b19d49901abd80afa963c45e08cc6f34cb28c715fd9082256474c93d2bff4361.exe
    "C:\Users\Admin\AppData\Local\Temp\b19d49901abd80afa963c45e08cc6f34cb28c715fd9082256474c93d2bff4361.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\wuixea.exe
      "C:\Users\Admin\wuixea.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wuixea.exe

    Filesize

    128KB

    MD5

    84899af438ce566ef311adcb741736f6

    SHA1

    d8d62372a9c415976cd9931e1ea06b36cb0e3fa8

    SHA256

    ab53b699b1933ca2637a9174de96b89c814cc7f99983b24bc4328ae53fea0bde

    SHA512

    59fe644e859bf81bfe94b8a2f2cc509c1c0efb35a7ac3334a00421c07a145601f6209370c5140170dc4dbd3ae62a95a2ee952b8c733816ce7599d13bbae6db3f

  • C:\Users\Admin\wuixea.exe

    Filesize

    128KB

    MD5

    84899af438ce566ef311adcb741736f6

    SHA1

    d8d62372a9c415976cd9931e1ea06b36cb0e3fa8

    SHA256

    ab53b699b1933ca2637a9174de96b89c814cc7f99983b24bc4328ae53fea0bde

    SHA512

    59fe644e859bf81bfe94b8a2f2cc509c1c0efb35a7ac3334a00421c07a145601f6209370c5140170dc4dbd3ae62a95a2ee952b8c733816ce7599d13bbae6db3f

  • memory/1656-132-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1656-135-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1972-136-0x0000000000000000-mapping.dmp

  • memory/1972-141-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1972-142-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB