Analysis

  • max time kernel
    151s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:06

General

  • Target

    4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe

  • Size

    260KB

  • MD5

    349815881bc9147ffc26843be2939ff0

  • SHA1

    785f1230a94f7bb364fa713e402aeec31582a2ff

  • SHA256

    4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0

  • SHA512

    a111de01daa7e683f9042f46411bba9e255a7fefb3aa28e0c16aae5dd818621c537148d1ad384958d4879c600adc35457b79a4fc6f6139caefb75b276e3f1b81

  • SSDEEP

    6144:V4HtUUp7WQn6mr1R4bKLnXejKloO6JU1J7QnpXZ7Ta9kzU2/pn:VkJp6Qn6mr1R4bKLnXaKaO6O1JAptH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe
    "C:\Users\Admin\AppData\Local\Temp\4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Users\Admin\duapuo.exe
      "C:\Users\Admin\duapuo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\duapuo.exe

    Filesize

    260KB

    MD5

    3eb1662e469b1d2e11139bc75c9d44fe

    SHA1

    cb0c755cecc704aec21ba9f387664c6bad6712f8

    SHA256

    f6a18563eaaae93d483718dbc22e9d3e38ca3554661c2694e1a90d7a74c39c12

    SHA512

    d9d44f7b7356b4543f18ca27228556e3497882ee88e615e809d737bc12093661df3421c3ed5c8030098e4a25a2e24fff0deca46d63703d9f61749a9d9edb807f

  • C:\Users\Admin\duapuo.exe

    Filesize

    260KB

    MD5

    3eb1662e469b1d2e11139bc75c9d44fe

    SHA1

    cb0c755cecc704aec21ba9f387664c6bad6712f8

    SHA256

    f6a18563eaaae93d483718dbc22e9d3e38ca3554661c2694e1a90d7a74c39c12

    SHA512

    d9d44f7b7356b4543f18ca27228556e3497882ee88e615e809d737bc12093661df3421c3ed5c8030098e4a25a2e24fff0deca46d63703d9f61749a9d9edb807f