Analysis

  • max time kernel
    154s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 19:00

General

  • Target

    149dac716b72428daf24d3e0ae11aafdea0a401b87995651b0a1ee4510b68479.exe

  • Size

    232KB

  • MD5

    44381948c8f32f90a00620b667db078c

  • SHA1

    606f2c82c0539f055a8aa052fed57983b16f3c17

  • SHA256

    149dac716b72428daf24d3e0ae11aafdea0a401b87995651b0a1ee4510b68479

  • SHA512

    361e8190928c3514083ed9209478f62bd01953a2a71aa8109cbc5a40d0f969067950d1d9a38b70f997980cc7cc02bfec8087362ab903a52e963b3d296e040f63

  • SSDEEP

    6144:aG5y2uK3PFKs78vpRTlEqxF6snji81RUinKbLqq:aGRuYPhpX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\149dac716b72428daf24d3e0ae11aafdea0a401b87995651b0a1ee4510b68479.exe
    "C:\Users\Admin\AppData\Local\Temp\149dac716b72428daf24d3e0ae11aafdea0a401b87995651b0a1ee4510b68479.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Users\Admin\foaku.exe
      "C:\Users\Admin\foaku.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\foaku.exe
    Filesize

    232KB

    MD5

    0849ab0c97fdfa551f886db294fbd512

    SHA1

    683b308e1b0089d7217480fbc6376ef8362395ba

    SHA256

    835eda1f7bf718db8f91772e4596614cb13693bbcf4d399ab4f05f2d90ba5a08

    SHA512

    7df4ff0781a17ffec9cf15b12e5003c90b2d718130afc78eba949af0bf55c34568f56892ad9a24afb2ea96416a02303b95194bb5a27b1d7e689fc9ce92c2d4c4

  • C:\Users\Admin\foaku.exe
    Filesize

    232KB

    MD5

    0849ab0c97fdfa551f886db294fbd512

    SHA1

    683b308e1b0089d7217480fbc6376ef8362395ba

    SHA256

    835eda1f7bf718db8f91772e4596614cb13693bbcf4d399ab4f05f2d90ba5a08

    SHA512

    7df4ff0781a17ffec9cf15b12e5003c90b2d718130afc78eba949af0bf55c34568f56892ad9a24afb2ea96416a02303b95194bb5a27b1d7e689fc9ce92c2d4c4

  • memory/2620-134-0x0000000000000000-mapping.dmp