Analysis

  • max time kernel
    190s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:48

General

  • Target

    fa3b94157c124546ca0981100a6c2c095167b1d8577c026119c604c745baea0d.exe

  • Size

    220KB

  • MD5

    4d2ecaee7d1124a4e17f1cac127f2b96

  • SHA1

    6f0bc78ae426bd42400a4472bab258585257bb4c

  • SHA256

    fa3b94157c124546ca0981100a6c2c095167b1d8577c026119c604c745baea0d

  • SHA512

    23fa24ebdf72966877d08a9460976978c95d050268b018c07a7dce9fa21321336474fd4bba47f04ae06761b0ee9f40847a9a7ad37885cbf0385468c3260f0df0

  • SSDEEP

    3072:PUOu+kr8YUL4qx9RIHgil3UuhSa3U3dD8d6Oy+MIrnj3J+Nhi:cO7ko15x9SHVeOj0Q

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa3b94157c124546ca0981100a6c2c095167b1d8577c026119c604c745baea0d.exe
    "C:\Users\Admin\AppData\Local\Temp\fa3b94157c124546ca0981100a6c2c095167b1d8577c026119c604c745baea0d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Users\Admin\boobi.exe
      "C:\Users\Admin\boobi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2492

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\boobi.exe

    Filesize

    220KB

    MD5

    cf2b8b47f5db255507cc18b57b1b12a3

    SHA1

    a3152556f99e254e164b6053774239b463ca7e9f

    SHA256

    b307ee52baa32ec84f6670dedc12423528a51a5558f60c0a7d799eb902196ff7

    SHA512

    a66bec1068888de6429f6637ce863a1811e62c49677efced9afdf927d480f8e2599966a4e25605727ebde103570616d0ec41d0a89e15a0e58cf410755af5c865

  • C:\Users\Admin\boobi.exe

    Filesize

    220KB

    MD5

    cf2b8b47f5db255507cc18b57b1b12a3

    SHA1

    a3152556f99e254e164b6053774239b463ca7e9f

    SHA256

    b307ee52baa32ec84f6670dedc12423528a51a5558f60c0a7d799eb902196ff7

    SHA512

    a66bec1068888de6429f6637ce863a1811e62c49677efced9afdf927d480f8e2599966a4e25605727ebde103570616d0ec41d0a89e15a0e58cf410755af5c865

  • memory/2492-134-0x0000000000000000-mapping.dmp