Analysis

  • max time kernel
    158s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 20:55

General

  • Target

    f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe

  • Size

    112KB

  • MD5

    05b7e9a1254b0be017a77b7db51ed440

  • SHA1

    f7939cca6442cc80a654f810ffcd3bc2d2170501

  • SHA256

    f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee

  • SHA512

    36d9f5781da1580937c04f64530e8055d7c3fe734467f7713beb39f99aedf72f6178506cf552a3772d1e2507cb629f7e014390361989edd104a57d316aadbdad

  • SSDEEP

    3072:7yplt8/lJlfkX9kXWqgkXAkXAkXAkXtkX8kXQkXhkXIkX/kXdkX+kXmkXJkXMkXl:7ypltekX9kXWqgkXAkXAkXAkXtkX8kXl

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe
    "C:\Users\Admin\AppData\Local\Temp\f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\tugeb.exe
      "C:\Users\Admin\tugeb.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2328

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tugeb.exe

    Filesize

    112KB

    MD5

    71223c1eeb1210633dfb7ee06d15cea5

    SHA1

    88d6f22e27e5ee941ee58b6d42361be4ca9da519

    SHA256

    fb30fe43efbcac06dcf088543ceda97a2c31686b41359b29c5edaf6f5b252d97

    SHA512

    f9b436722977d4c76fb1d6f02fb55490fa1cf9f1e09a819e04a86bca3241fb727ae2ae2022c5e8a344df97557117ddf9834bfb11e0fcde3ec153afc3383e3b06

  • C:\Users\Admin\tugeb.exe

    Filesize

    112KB

    MD5

    71223c1eeb1210633dfb7ee06d15cea5

    SHA1

    88d6f22e27e5ee941ee58b6d42361be4ca9da519

    SHA256

    fb30fe43efbcac06dcf088543ceda97a2c31686b41359b29c5edaf6f5b252d97

    SHA512

    f9b436722977d4c76fb1d6f02fb55490fa1cf9f1e09a819e04a86bca3241fb727ae2ae2022c5e8a344df97557117ddf9834bfb11e0fcde3ec153afc3383e3b06

  • memory/2328-134-0x0000000000000000-mapping.dmp