Analysis

  • max time kernel
    154s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:20

General

  • Target

    778d6eed4658765a77114cbcb0753cc8a46f340e46f301619a498bfa019f00de.exe

  • Size

    180KB

  • MD5

    262d9a79b761f4a8cdca89efb15d96a0

  • SHA1

    0b209933de146800935542249a4f7535818b017f

  • SHA256

    778d6eed4658765a77114cbcb0753cc8a46f340e46f301619a498bfa019f00de

  • SHA512

    60a8c1065404a718416ebfd70bf9a7d9b301c9585a43f84da342aa19dd83c2cee9bf0e128640f14f610209dbc18dd87ff16628ce6aee7c59188f6443aae37feb

  • SSDEEP

    3072:KFKvr1MlttMFz8o+F334VSlkfoyHYb/zCHPEhg5JN8x+eDfcAuQPUSYrulWi:KFW1MltKaJkHHYb/zCHPEhg5JN8x+eDD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\778d6eed4658765a77114cbcb0753cc8a46f340e46f301619a498bfa019f00de.exe
    "C:\Users\Admin\AppData\Local\Temp\778d6eed4658765a77114cbcb0753cc8a46f340e46f301619a498bfa019f00de.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\vioiyim.exe
      "C:\Users\Admin\vioiyim.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1152

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vioiyim.exe

    Filesize

    180KB

    MD5

    b01ef1b8c79427807ba986c950b31777

    SHA1

    2932537b800619704adeac4d851b23efc21cb739

    SHA256

    e2f7520fc9f92b94415c8695f527a446fc48de85d51824a34f3353d24c36e3d1

    SHA512

    7dba406133c079fe9479d1b0c9650695452da18b3af5de460787dbc20e4f8d84ed5982e7b44892a7e2692fa5f002116886ae4aebc6c5d450fbcd41ab90840f95

  • C:\Users\Admin\vioiyim.exe

    Filesize

    180KB

    MD5

    b01ef1b8c79427807ba986c950b31777

    SHA1

    2932537b800619704adeac4d851b23efc21cb739

    SHA256

    e2f7520fc9f92b94415c8695f527a446fc48de85d51824a34f3353d24c36e3d1

    SHA512

    7dba406133c079fe9479d1b0c9650695452da18b3af5de460787dbc20e4f8d84ed5982e7b44892a7e2692fa5f002116886ae4aebc6c5d450fbcd41ab90840f95

  • memory/1152-134-0x0000000000000000-mapping.dmp