Analysis

  • max time kernel
    205s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:59

General

  • Target

    3da663fd151b180bb43f07316e5f1ab8fca9e870103c195b75da625b1d447130.exe

  • Size

    108KB

  • MD5

    49775d19eb3c15b18f9e17dc9461ca06

  • SHA1

    353f0ac07e674032291c5b967c302abcd1ad9619

  • SHA256

    3da663fd151b180bb43f07316e5f1ab8fca9e870103c195b75da625b1d447130

  • SHA512

    41d8e24d5f4aba46d46bd13c430ffc8dca22b324dc981b8cee69ad3d331a79091407bf4ba0cccaeb36e2a74fb2d21d7fc64f1cbe9f18d059bb4f4290e40fc5b4

  • SSDEEP

    1536:JKZSPvOJofZMf8G6oX9aHyELqOW3GFw7vwmqFkyYpWe5srvIyiA+UWI5Q0wXT50h:Xv7oX9EO7LqW3XHCnLl

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3da663fd151b180bb43f07316e5f1ab8fca9e870103c195b75da625b1d447130.exe
    "C:\Users\Admin\AppData\Local\Temp\3da663fd151b180bb43f07316e5f1ab8fca9e870103c195b75da625b1d447130.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Users\Admin\hslut.exe
      "C:\Users\Admin\hslut.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hslut.exe
    Filesize

    108KB

    MD5

    d5e3a91bea8cfab6cbaa0f10b2e200f1

    SHA1

    3f4411c3fc0e504667095536e5b5226155e9a308

    SHA256

    6cf6aab6346d7984ea360b81ca2bda7068e0b5580961771c8c6a0c1efc6d0e5f

    SHA512

    107966c4d7605028591ab12b77f28502a2f11b0c1c9737855329a8bba91039eb2866c46ec2dfe615594bb7d77e43cba19354cea5aedeee5ee7ec343ce292befb

  • C:\Users\Admin\hslut.exe
    Filesize

    108KB

    MD5

    d5e3a91bea8cfab6cbaa0f10b2e200f1

    SHA1

    3f4411c3fc0e504667095536e5b5226155e9a308

    SHA256

    6cf6aab6346d7984ea360b81ca2bda7068e0b5580961771c8c6a0c1efc6d0e5f

    SHA512

    107966c4d7605028591ab12b77f28502a2f11b0c1c9737855329a8bba91039eb2866c46ec2dfe615594bb7d77e43cba19354cea5aedeee5ee7ec343ce292befb

  • memory/2356-134-0x0000000000000000-mapping.dmp