Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:29

General

  • Target

    1613b5863d2a9b7e258ea34dd7e82f915b6b054c74a517cd58b3ce7393a3b2c2.exe

  • Size

    300KB

  • MD5

    40f09a3954d81c9cca3e158fe69509aa

  • SHA1

    050795dc3cae450f53dd5ed70fc31dc2b5c3e121

  • SHA256

    1613b5863d2a9b7e258ea34dd7e82f915b6b054c74a517cd58b3ce7393a3b2c2

  • SHA512

    b15f526af835bbd0cd636895161d4683acb2f080f8c51387a70cb2ba9e8f6c99ed592aa25e64bb67b3278c85bcdf22110a2d78fd795eeb111a1564043b3f90d7

  • SSDEEP

    6144:ejod6a6avuz2kX681UbgwDO7zRdmM57M186cFGK:ejOlvuzDEK

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1613b5863d2a9b7e258ea34dd7e82f915b6b054c74a517cd58b3ce7393a3b2c2.exe
    "C:\Users\Admin\AppData\Local\Temp\1613b5863d2a9b7e258ea34dd7e82f915b6b054c74a517cd58b3ce7393a3b2c2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\laiale.exe
      "C:\Users\Admin\laiale.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\laiale.exe

    Filesize

    300KB

    MD5

    996d60fc835e83e352d513f071137aa6

    SHA1

    0c072192d4e65fbca9adb92783d9e7e3c10dda0e

    SHA256

    6b7a030e10c4fc2fc38065943586cbb07c0b8fbb7c38402539436be6daa486ae

    SHA512

    411d71a6e84a19df58bf59b6807eb76c21c3672806bd49b5f2b208db5c95e822d4b0aea8821d03958ec6cbf785c4ea4d42e7c3ce745f7cbe2fb7af59669b816c

  • C:\Users\Admin\laiale.exe

    Filesize

    300KB

    MD5

    996d60fc835e83e352d513f071137aa6

    SHA1

    0c072192d4e65fbca9adb92783d9e7e3c10dda0e

    SHA256

    6b7a030e10c4fc2fc38065943586cbb07c0b8fbb7c38402539436be6daa486ae

    SHA512

    411d71a6e84a19df58bf59b6807eb76c21c3672806bd49b5f2b208db5c95e822d4b0aea8821d03958ec6cbf785c4ea4d42e7c3ce745f7cbe2fb7af59669b816c

  • memory/372-134-0x0000000000000000-mapping.dmp