Analysis

  • max time kernel
    291s
  • max time network
    341s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:21

General

  • Target

    b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe

  • Size

    252KB

  • MD5

    0539065b43e4e75d5e100593dd034f36

  • SHA1

    bb173ebb6ebd0c1d47215c78647a539a70526632

  • SHA256

    b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9

  • SHA512

    d7d293c47862adf0f2789cd22304340cb7ca6db495883bac99e515941825b76abb04ca7cb637cc062d4c869594b778d81266eaab7d51bee5c55e80b437f38d21

  • SSDEEP

    6144:Orh0e5rhVz84rjL1/gq0n74Gp+QFbLVBvOP+c+EdMUutF:+h0KrhK4rjL1/gq0n74Gp+QFbLV0+RUa

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 36 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe
    "C:\Users\Admin\AppData\Local\Temp\b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Users\Admin\piepeoh.exe
      "C:\Users\Admin\piepeoh.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2920

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\piepeoh.exe

    Filesize

    252KB

    MD5

    0f241074de96601d254da8f5d57d804b

    SHA1

    f4f1b3786fafce55a507d7c0c2f92ceead94c1c3

    SHA256

    650ddb97fa1003b3e75b7e1ae5548b5ce76ac9f98b3bdece7be359bd6bc1ea55

    SHA512

    a428157e75bd07df890cd727cba19b2d1bc2cb0d48d9ed015469bbc8ebfd2bff34359cf326dfd26eb6d543079a6f28421fa7289e44d4ee33bc1869b3b38f8761

  • C:\Users\Admin\piepeoh.exe

    Filesize

    252KB

    MD5

    0f241074de96601d254da8f5d57d804b

    SHA1

    f4f1b3786fafce55a507d7c0c2f92ceead94c1c3

    SHA256

    650ddb97fa1003b3e75b7e1ae5548b5ce76ac9f98b3bdece7be359bd6bc1ea55

    SHA512

    a428157e75bd07df890cd727cba19b2d1bc2cb0d48d9ed015469bbc8ebfd2bff34359cf326dfd26eb6d543079a6f28421fa7289e44d4ee33bc1869b3b38f8761

  • memory/2920-134-0x0000000000000000-mapping.dmp