Analysis

  • max time kernel
    150s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:16

General

  • Target

    52b2e8816899d67ab95751c2be7da6c0b3afc00f7bd8c9bfd24de9c7569530fe.exe

  • Size

    156KB

  • MD5

    1acb541c4d588455777cc14b34dea100

  • SHA1

    18fa51087b108886b4cdb61a66607e3d3219ab55

  • SHA256

    52b2e8816899d67ab95751c2be7da6c0b3afc00f7bd8c9bfd24de9c7569530fe

  • SHA512

    f1cab42de84cdc1e35684a7a3061a35f4e1a06e96a285aa969842bb22f7729ae03cb8b0080751d16e7313dc8cb3d865e7d2d9bc48740377b181aa1790d8b665c

  • SSDEEP

    3072:MK3gJdOYt+Vvu/5gEsSy8dH0pLaATo4oi6Yp4oQZiEIo:neqvuTD0pLa2o4uYDWV

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52b2e8816899d67ab95751c2be7da6c0b3afc00f7bd8c9bfd24de9c7569530fe.exe
    "C:\Users\Admin\AppData\Local\Temp\52b2e8816899d67ab95751c2be7da6c0b3afc00f7bd8c9bfd24de9c7569530fe.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Users\Admin\toitueq.exe
      "C:\Users\Admin\toitueq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\toitueq.exe

    Filesize

    156KB

    MD5

    bea65d0c768633f7b1e3bb2f8dc18866

    SHA1

    f93792acd973863f9e17885f6503f8a2c9851f95

    SHA256

    7d21b3d917588a232ba8932e5c8af23f78b8048230ab823891c76743f23e7e43

    SHA512

    b1887ba8b7615385cddf2258a06344231ca3c34184b69eb8f0c19435fde982ecf0b9d096684be77de18d6b4f79029c28e6c77ee9253ba1b8b27cfc8e5f6ac04f

  • C:\Users\Admin\toitueq.exe

    Filesize

    156KB

    MD5

    bea65d0c768633f7b1e3bb2f8dc18866

    SHA1

    f93792acd973863f9e17885f6503f8a2c9851f95

    SHA256

    7d21b3d917588a232ba8932e5c8af23f78b8048230ab823891c76743f23e7e43

    SHA512

    b1887ba8b7615385cddf2258a06344231ca3c34184b69eb8f0c19435fde982ecf0b9d096684be77de18d6b4f79029c28e6c77ee9253ba1b8b27cfc8e5f6ac04f

  • memory/5096-134-0x0000000000000000-mapping.dmp