Analysis

  • max time kernel
    152s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:21

General

  • Target

    f66d77383d9033aec9dec7ca2e59c437449ab0ea497b3ffd784c81883fa72250.exe

  • Size

    144KB

  • MD5

    14edccfa616414fb38548dd31c7d9f40

  • SHA1

    31285837de8f3f7a0115c5c5127e4bf4506786ca

  • SHA256

    f66d77383d9033aec9dec7ca2e59c437449ab0ea497b3ffd784c81883fa72250

  • SHA512

    156ce27b64a0e71197ead8735ae24f5c19ad845be231a28f084fca0ae53f3220b29e34449d8d48291d18ff3a7c942a3510a1e8470c0ba1560fb4e394ef3ade4b

  • SSDEEP

    3072:QHKF/fvhINgVs+Y9YXeKjxF1yO13TWDnt+:QqFvq2gYuKjxF15s

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f66d77383d9033aec9dec7ca2e59c437449ab0ea497b3ffd784c81883fa72250.exe
    "C:\Users\Admin\AppData\Local\Temp\f66d77383d9033aec9dec7ca2e59c437449ab0ea497b3ffd784c81883fa72250.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5016
    • C:\Users\Admin\foaowon.exe
      "C:\Users\Admin\foaowon.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5004

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\foaowon.exe

    Filesize

    144KB

    MD5

    aa0d9bcc44e519703e9e80aa0a66a0fd

    SHA1

    95bd4ed63f320fc40eab46c83ef182cf43ccd918

    SHA256

    2d28ad26787d93f0443a2a219328bfac79162f8f751d9014248e049ab3784c22

    SHA512

    7bacb49870edd4ed003e531c4f7538d43246ea72e44ece0e509e32aefccf6b669fc66d4526b6648aa47f4164736ab9b3c3ae6559dbba42d2ca7e3926427dfcb8

  • C:\Users\Admin\foaowon.exe

    Filesize

    144KB

    MD5

    aa0d9bcc44e519703e9e80aa0a66a0fd

    SHA1

    95bd4ed63f320fc40eab46c83ef182cf43ccd918

    SHA256

    2d28ad26787d93f0443a2a219328bfac79162f8f751d9014248e049ab3784c22

    SHA512

    7bacb49870edd4ed003e531c4f7538d43246ea72e44ece0e509e32aefccf6b669fc66d4526b6648aa47f4164736ab9b3c3ae6559dbba42d2ca7e3926427dfcb8

  • memory/5004-134-0x0000000000000000-mapping.dmp