Analysis

  • max time kernel
    179s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:51

General

  • Target

    3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe

  • Size

    244KB

  • MD5

    353631c7e3686b6aba08dcab28849013

  • SHA1

    0e0054e1175f1119e44aa71f94ad9b059c207338

  • SHA256

    3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840

  • SHA512

    48f3577e731cf6b984b8602241eba4855a7dd2846a76e527d347a5c55ea49b3927d8ae0eff285b93c1b586696db5a6a9dde0b44652800d7b9f8386af94e1d469

  • SSDEEP

    6144:oHAn9UvAqXDdJZRx8zm/4Q7OkkXJLbg4xK4laa:Pn9UvxXDdJZRx8zm/4Q7OksJLbg4x

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe
    "C:\Users\Admin\AppData\Local\Temp\3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Users\Admin\geoayaq.exe
      "C:\Users\Admin\geoayaq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\geoayaq.exe

    Filesize

    244KB

    MD5

    edbe8501fd3dfd80ff30c65df59a7183

    SHA1

    41b74dc45b509ff2e04f551111c901f849e3fc04

    SHA256

    34b3c0eee8018deeb0c76e73407df92af8fa6ffd98139051d6fa1f8880d65afb

    SHA512

    55e3a5cefc99e82c54e4eab23af810d563380a6a587f94284ce050623e727632a6d7916e69868a95dd1bc8031130d76d77b0d35d4afc84257def89a822f772e4

  • C:\Users\Admin\geoayaq.exe

    Filesize

    244KB

    MD5

    edbe8501fd3dfd80ff30c65df59a7183

    SHA1

    41b74dc45b509ff2e04f551111c901f849e3fc04

    SHA256

    34b3c0eee8018deeb0c76e73407df92af8fa6ffd98139051d6fa1f8880d65afb

    SHA512

    55e3a5cefc99e82c54e4eab23af810d563380a6a587f94284ce050623e727632a6d7916e69868a95dd1bc8031130d76d77b0d35d4afc84257def89a822f772e4

  • memory/4180-134-0x0000000000000000-mapping.dmp