Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 19:01

General

  • Target

    c935430c9e6907a6d9f527b9bca3562ffe19e9a7e827f7d79ccf7c09ae9010fa.exe

  • Size

    280KB

  • MD5

    530d48fdf674b232be66f727bdcd5fa8

  • SHA1

    52c93089d1d4e26f81063ec05543c8b85b4b6bb3

  • SHA256

    c935430c9e6907a6d9f527b9bca3562ffe19e9a7e827f7d79ccf7c09ae9010fa

  • SHA512

    410bf9d53b2ddd9209e4371341e5aa8bf69751e53611ef3ad30ec8a338e74f63fa140888a45f9ebfff0ec533f79e8e61a9c87b7588e6be445e539f752f342b58

  • SSDEEP

    3072:DkW/v+/mkT/Ozb1/7Vc1tdjZQQLnQhhyBZ8Irfdaqebssot7rFVtWzdbcTfBX:DP2mK2bVMJuQ0hhynfdaJqNrtWzCd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c935430c9e6907a6d9f527b9bca3562ffe19e9a7e827f7d79ccf7c09ae9010fa.exe
    "C:\Users\Admin\AppData\Local\Temp\c935430c9e6907a6d9f527b9bca3562ffe19e9a7e827f7d79ccf7c09ae9010fa.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Users\Admin\foifeu.exe
      "C:\Users\Admin\foifeu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\foifeu.exe

    Filesize

    280KB

    MD5

    b4080da58d4c57c485c40b51dac469f6

    SHA1

    94a5039352afad5ac5851fd3772f69e03b5b373b

    SHA256

    5e7dba4d33cc8511bc519dcaf966a2e69f613096af2dbde44d142d1461dd0685

    SHA512

    6218cbd28bfed0d80d4cde97310303f37cfc78877b0cd1528b1dda37d829831db99e9ec00ce06fbeaeb8baf09c3e931cfe9552f264c933a2686fe0b54d76e436

  • C:\Users\Admin\foifeu.exe

    Filesize

    280KB

    MD5

    b4080da58d4c57c485c40b51dac469f6

    SHA1

    94a5039352afad5ac5851fd3772f69e03b5b373b

    SHA256

    5e7dba4d33cc8511bc519dcaf966a2e69f613096af2dbde44d142d1461dd0685

    SHA512

    6218cbd28bfed0d80d4cde97310303f37cfc78877b0cd1528b1dda37d829831db99e9ec00ce06fbeaeb8baf09c3e931cfe9552f264c933a2686fe0b54d76e436

  • memory/3192-134-0x0000000000000000-mapping.dmp