Analysis

  • max time kernel
    154s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:20

General

  • Target

    20507798c83f15f870013e36cbb6557a95e824d79030670926da9f6bc48b600d.exe

  • Size

    224KB

  • MD5

    0776cea7056519c733f5fcb0c2eb506e

  • SHA1

    d9a9fc03137e9b24396d90b5d6e0c47ab6c7a1ea

  • SHA256

    20507798c83f15f870013e36cbb6557a95e824d79030670926da9f6bc48b600d

  • SHA512

    a9097a1fef6462af39bd2ce7bb54f3bbb6c10d4fd77c9170b324a495118ff69aa94ef9c1651b05988cb1f8375be8ca7aab689ea950eb17c582b2c613dfbb4c15

  • SSDEEP

    3072:W5IIbbsIqrgl4iEzjKTF40qVA0KNBx8lDA:W5IegIqrgCHpXA0KZ8O

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20507798c83f15f870013e36cbb6557a95e824d79030670926da9f6bc48b600d.exe
    "C:\Users\Admin\AppData\Local\Temp\20507798c83f15f870013e36cbb6557a95e824d79030670926da9f6bc48b600d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\geeam.exe
      "C:\Users\Admin\geeam.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4976

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\geeam.exe
    Filesize

    224KB

    MD5

    6b87e34b0a299c8b2cf2abd551d3d7f5

    SHA1

    deb3a789839ccca8259cba43d98caff48d49acdb

    SHA256

    1dc92bf6ff351720e8ddbd906ad895e6f9f3453c082793bb9a6a2ac9e63c3a7b

    SHA512

    ba286885b2f3e315e8d89ceefc9fe17a50515af16d86176222a737b78e933dc68e5db98e1ecd55424d5834194efd5087e30ae9bef0c3de01f8366437c9fc5636

  • C:\Users\Admin\geeam.exe
    Filesize

    224KB

    MD5

    6b87e34b0a299c8b2cf2abd551d3d7f5

    SHA1

    deb3a789839ccca8259cba43d98caff48d49acdb

    SHA256

    1dc92bf6ff351720e8ddbd906ad895e6f9f3453c082793bb9a6a2ac9e63c3a7b

    SHA512

    ba286885b2f3e315e8d89ceefc9fe17a50515af16d86176222a737b78e933dc68e5db98e1ecd55424d5834194efd5087e30ae9bef0c3de01f8366437c9fc5636

  • memory/2400-134-0x0000000000400000-0x000000000043F000-memory.dmp
    Filesize

    252KB

  • memory/2400-135-0x0000000000400000-0x000000000043F000-memory.dmp
    Filesize

    252KB

  • memory/4976-136-0x0000000000000000-mapping.dmp
  • memory/4976-141-0x0000000000400000-0x000000000043F000-memory.dmp
    Filesize

    252KB

  • memory/4976-142-0x0000000000400000-0x000000000043F000-memory.dmp
    Filesize

    252KB