Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:18

General

  • Target

    73a7cefe584655a547a42fc55846ad704e15cf8829b25fd41f36d5c5bcd5f502.exe

  • Size

    224KB

  • MD5

    173d587752501adc66abc51591ddd7b0

  • SHA1

    c3e4fcbebb3f54093ef225e8bf27b8c6a6bc7079

  • SHA256

    73a7cefe584655a547a42fc55846ad704e15cf8829b25fd41f36d5c5bcd5f502

  • SHA512

    27ceac3c9b575bc043293061baa2a412182149744c4ab72cd0e4c28fd8d1b9b8326320bf48d078b60de5d7ff1ffd70664206c89279603f8d42193b5fe0b7b059

  • SSDEEP

    3072:RXyqNsMoBuBoZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax26:gqN5BMp4LnbmlrZW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73a7cefe584655a547a42fc55846ad704e15cf8829b25fd41f36d5c5bcd5f502.exe
    "C:\Users\Admin\AppData\Local\Temp\73a7cefe584655a547a42fc55846ad704e15cf8829b25fd41f36d5c5bcd5f502.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\paaok.exe
      "C:\Users\Admin\paaok.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4744

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\paaok.exe
    Filesize

    224KB

    MD5

    59c834e5ad41a09569ee833e2121f4c9

    SHA1

    bf29f7b8696601e5fb541147da9af9ca94d5e42c

    SHA256

    3a2028bbd5b0c9548d412ebed8d1dd9acb8b30eeb0eb8cdfff0ee05aacb5d639

    SHA512

    5a7976f857861d1aacf23a6f7a1e26366c4cb601cac47c19e3d1530536d341a9564c3f96ac8ea038c24119b793a575e43327ea5cc3d5a22de0e147c31da710bb

  • C:\Users\Admin\paaok.exe
    Filesize

    224KB

    MD5

    59c834e5ad41a09569ee833e2121f4c9

    SHA1

    bf29f7b8696601e5fb541147da9af9ca94d5e42c

    SHA256

    3a2028bbd5b0c9548d412ebed8d1dd9acb8b30eeb0eb8cdfff0ee05aacb5d639

    SHA512

    5a7976f857861d1aacf23a6f7a1e26366c4cb601cac47c19e3d1530536d341a9564c3f96ac8ea038c24119b793a575e43327ea5cc3d5a22de0e147c31da710bb

  • memory/2148-132-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/2148-141-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/4744-135-0x0000000000000000-mapping.dmp
  • memory/4744-140-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/4744-142-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB