Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:18

General

  • Target

    7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe

  • Size

    224KB

  • MD5

    198c4ff11d5ba6d09b23d23eac7c1fc8

  • SHA1

    022dd063f2bbf27f96c4d6142e4386954f11ad2a

  • SHA256

    7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587

  • SHA512

    f7dd6617fcfd56e9e182ef9bb37e51cf8be764a26c5302460f458fc56e8ea602d1b1fd4d8cb08694e2473614d7426384c6ab7971830cf00638b4f6ed478fb9a8

  • SSDEEP

    3072:bb3N87hBQQoZV7l2mclfj4Uvx+9sNxu+2eRcKgsU61JkkX39RLrw4ySKUbax2+gr:nNXt74L76nrZ3y

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe
    "C:\Users\Admin\AppData\Local\Temp\7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Users\Admin\feuuli.exe
      "C:\Users\Admin\feuuli.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4968

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\feuuli.exe
    Filesize

    224KB

    MD5

    5ce0f7486fc4d659712e65868030387a

    SHA1

    983c2187702c0a8a05105d0a209f234f2c416797

    SHA256

    a345c755092778088f4d3d63216ea53c495f31c461a9789629dece6258dbb6ea

    SHA512

    8a6431f0f9c6a8008b0a2c65be521764f06893276f1c0681296e484b05f78c3a257b1e344f54fa43c343bf4ab1cb08381e3339508d20ad46763bad1b9a538c56

  • C:\Users\Admin\feuuli.exe
    Filesize

    224KB

    MD5

    5ce0f7486fc4d659712e65868030387a

    SHA1

    983c2187702c0a8a05105d0a209f234f2c416797

    SHA256

    a345c755092778088f4d3d63216ea53c495f31c461a9789629dece6258dbb6ea

    SHA512

    8a6431f0f9c6a8008b0a2c65be521764f06893276f1c0681296e484b05f78c3a257b1e344f54fa43c343bf4ab1cb08381e3339508d20ad46763bad1b9a538c56

  • memory/4968-134-0x0000000000000000-mapping.dmp