Analysis

  • max time kernel
    96s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:08

General

  • Target

    272e4215237515acfeb3d6a818660b97e46b85a90fbb8f0404dc4d44e6cda925.exe

  • Size

    224KB

  • MD5

    276ea683aea51e676f728ab681972cfe

  • SHA1

    3482a245e220bf80453897ffb9ce36eb77df9272

  • SHA256

    272e4215237515acfeb3d6a818660b97e46b85a90fbb8f0404dc4d44e6cda925

  • SHA512

    aa318d01d800f77893471365cb9a9d5f5998dde91583a0b4d9c5fb0b586756170a6167cc5e6db8eca4a5534b20a96943d296378af67fd7e46c8f5948afb984f9

  • SSDEEP

    1536:z7r/YQsVV5awoIZsh0CF+sKE0C1rZL4H0c2BHtg1/J+iZAb+g9WCyiHC/XRG1iFg:jAQa5MOFCsv/CL0jJMNWCyiHC31psL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\272e4215237515acfeb3d6a818660b97e46b85a90fbb8f0404dc4d44e6cda925.exe
    "C:\Users\Admin\AppData\Local\Temp\272e4215237515acfeb3d6a818660b97e46b85a90fbb8f0404dc4d44e6cda925.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Users\Admin\suaimu.exe
      "C:\Users\Admin\suaimu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\suaimu.exe

    Filesize

    224KB

    MD5

    65623952c6a0c8eebbd0b8088e2cf484

    SHA1

    661f0ca08acaadb8dae7eb14506cab967923693c

    SHA256

    56f67b8bada3c69bf3ccedfc5b888d4538b2c34c32ea1304d6c3d6dcb041969c

    SHA512

    662e0c3c90b43afdc4620dbf0fa5a0c5f283d88a647b93dcd4d728f523b456f6caec70f1e0fc777e638c07fe768c60e71230f86d0341de4d2013466899845c09

  • C:\Users\Admin\suaimu.exe

    Filesize

    224KB

    MD5

    65623952c6a0c8eebbd0b8088e2cf484

    SHA1

    661f0ca08acaadb8dae7eb14506cab967923693c

    SHA256

    56f67b8bada3c69bf3ccedfc5b888d4538b2c34c32ea1304d6c3d6dcb041969c

    SHA512

    662e0c3c90b43afdc4620dbf0fa5a0c5f283d88a647b93dcd4d728f523b456f6caec70f1e0fc777e638c07fe768c60e71230f86d0341de4d2013466899845c09

  • memory/2240-134-0x0000000000000000-mapping.dmp