Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:55

General

  • Target

    39eee700484ac1167a85cb2717eb8ef7b1cbbbb56b3062657a3b70f0a96f8fd8.exe

  • Size

    252KB

  • MD5

    4dae4d54123c20558ae5de9d02aefd30

  • SHA1

    a3d86f2d49a4e3ac3c6d456f7f4f920d5a328308

  • SHA256

    39eee700484ac1167a85cb2717eb8ef7b1cbbbb56b3062657a3b70f0a96f8fd8

  • SHA512

    a6597b6cc0b2fcd9b4625c97728aad00690acb39b2135f3ff0d60eaaca1e3d4fb8a60b189704905a6fdbdd9ab1e3f6e44d15ef937d203d6de6450a6980170b26

  • SSDEEP

    3072:VrAc6x7La3sWvZ0OgRqTAJcLGGO/xuiEyJeOOeGs5oxnkNzQKtjBb:VrZFx/ZLA4PmG6dB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39eee700484ac1167a85cb2717eb8ef7b1cbbbb56b3062657a3b70f0a96f8fd8.exe
    "C:\Users\Admin\AppData\Local\Temp\39eee700484ac1167a85cb2717eb8ef7b1cbbbb56b3062657a3b70f0a96f8fd8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Users\Admin\hiixue.exe
      "C:\Users\Admin\hiixue.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hiixue.exe

    Filesize

    252KB

    MD5

    b7d7779898b8359e94001494cd89a966

    SHA1

    4a3eb124f54fe85e746cab156bd485f0946a4614

    SHA256

    293f54ba27c1427c8c53b6e9d70d16d5552c50cff75c517ddb025c6ceab4ed0f

    SHA512

    ab5191870a786598073f32eba8467f8629ec6bc783ae80523199617e93b6805a42b46b5d66f7c8c3ec13b28fac8754e55e39f80fff8dd1a2198cd7f2b8905390

  • C:\Users\Admin\hiixue.exe

    Filesize

    252KB

    MD5

    b7d7779898b8359e94001494cd89a966

    SHA1

    4a3eb124f54fe85e746cab156bd485f0946a4614

    SHA256

    293f54ba27c1427c8c53b6e9d70d16d5552c50cff75c517ddb025c6ceab4ed0f

    SHA512

    ab5191870a786598073f32eba8467f8629ec6bc783ae80523199617e93b6805a42b46b5d66f7c8c3ec13b28fac8754e55e39f80fff8dd1a2198cd7f2b8905390

  • memory/4740-134-0x0000000000000000-mapping.dmp