Analysis

  • max time kernel
    151s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:38

General

  • Target

    1b7bb37c0fef2032ab1e09c001f668e7b43d44a1e445e7a2902fed4a0adc8d5a.exe

  • Size

    300KB

  • MD5

    2c0e2976b10c2b15669b98d856e73f1e

  • SHA1

    560aea953df8ff852668bd405c2c02319128655b

  • SHA256

    1b7bb37c0fef2032ab1e09c001f668e7b43d44a1e445e7a2902fed4a0adc8d5a

  • SHA512

    5eb31e0da731c58ef8fc27f3cf04ab918e9dae66e6f8e6b146e275e60ea9599e3ba16f6bb86d4c3fcb03d302569c1d8160270983b1c058225a5659a98855d2e3

  • SSDEEP

    6144:neXPmgf8dV949Y4ZI1+LKDshbrOmswuxBfVKA2vSuEh:qRf8dV949Y4ZI1+LKDshbrOykEvSuEh

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b7bb37c0fef2032ab1e09c001f668e7b43d44a1e445e7a2902fed4a0adc8d5a.exe
    "C:\Users\Admin\AppData\Local\Temp\1b7bb37c0fef2032ab1e09c001f668e7b43d44a1e445e7a2902fed4a0adc8d5a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Users\Admin\poobi.exe
      "C:\Users\Admin\poobi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\poobi.exe

    Filesize

    300KB

    MD5

    a03b513d58726ccfb7f9cde47b99a9c5

    SHA1

    9c81b6fadf72ff2974ba68fc59905a95dd85f19f

    SHA256

    1d899ba8d115e7b21fd22c0454cef5b643f9b61b41a50b1c4ff7078ce59689b8

    SHA512

    42c479002faf2fbd1f03b4fc72af653e3cf7e1bd37f9eeb10e6ef5c5c45eb7a75fab2000be47c26b889a1ef7023b9c6b34c4e802064fa90f49691db39dc51d37

  • C:\Users\Admin\poobi.exe

    Filesize

    300KB

    MD5

    a03b513d58726ccfb7f9cde47b99a9c5

    SHA1

    9c81b6fadf72ff2974ba68fc59905a95dd85f19f

    SHA256

    1d899ba8d115e7b21fd22c0454cef5b643f9b61b41a50b1c4ff7078ce59689b8

    SHA512

    42c479002faf2fbd1f03b4fc72af653e3cf7e1bd37f9eeb10e6ef5c5c45eb7a75fab2000be47c26b889a1ef7023b9c6b34c4e802064fa90f49691db39dc51d37

  • memory/1972-134-0x0000000000000000-mapping.dmp