Analysis

  • max time kernel
    152s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:21

General

  • Target

    42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe

  • Size

    136KB

  • MD5

    3430ff52775bed3ea223b54664f870a1

  • SHA1

    0f123f8438fe702576e07d2dbc7c0d4de571cc22

  • SHA256

    42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702

  • SHA512

    aa750b3b6dc72ccb71fd14ceec0d5b2d52750abf694acb00dede925371b3b0000676cd23eafd65fed7cfed516b94e29f1fcc1fa0e86fc28c6713ff2be2444d71

  • SSDEEP

    3072:yqsMMtnsXGsLd0gePcPuiPfDZS+biFO8bkwLI0zKdmGa44nK:yjn8XuPcPnfEXkZ0zKd934n

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe
    "C:\Users\Admin\AppData\Local\Temp\42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Users\Admin\clroil.exe
      "C:\Users\Admin\clroil.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\clroil.exe
    Filesize

    136KB

    MD5

    962ab222b3a14f18b87ad4ff673f754f

    SHA1

    c4ef465db40080a9254a338114b86bc9a9fceda5

    SHA256

    b4e04f2c0b1f7f5ac1fabfe5d5214898cdcd8a5a1b38b5b5b79c075f4b690f1a

    SHA512

    89dbc2c4cdc5689d1565adacc12890e691e8402760b47d0715b636246de81d70e1f50bcb148c625c611411b63c28d68fcc98f077fc7212915ce5f0fb3e4ca9c4

  • C:\Users\Admin\clroil.exe
    Filesize

    136KB

    MD5

    962ab222b3a14f18b87ad4ff673f754f

    SHA1

    c4ef465db40080a9254a338114b86bc9a9fceda5

    SHA256

    b4e04f2c0b1f7f5ac1fabfe5d5214898cdcd8a5a1b38b5b5b79c075f4b690f1a

    SHA512

    89dbc2c4cdc5689d1565adacc12890e691e8402760b47d0715b636246de81d70e1f50bcb148c625c611411b63c28d68fcc98f077fc7212915ce5f0fb3e4ca9c4

  • memory/4192-135-0x0000000000000000-mapping.dmp
  • memory/4192-140-0x0000000000400000-0x0000000000439000-memory.dmp
    Filesize

    228KB

  • memory/4192-142-0x0000000000400000-0x0000000000439000-memory.dmp
    Filesize

    228KB

  • memory/4760-132-0x0000000000400000-0x0000000000439000-memory.dmp
    Filesize

    228KB

  • memory/4760-141-0x0000000000400000-0x0000000000439000-memory.dmp
    Filesize

    228KB