Analysis

  • max time kernel
    197s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:29

General

  • Target

    543ead6adbf9d0867a1905c3746ac316d37682edb9d6c9ae9c5a82cb4d40d503.exe

  • Size

    200KB

  • MD5

    16c5eca660e858a18539058d07b0bb30

  • SHA1

    acf656814b4972995035d97fc3f172f5833969ac

  • SHA256

    543ead6adbf9d0867a1905c3746ac316d37682edb9d6c9ae9c5a82cb4d40d503

  • SHA512

    763367d1b3ff1a2297ab34fe8137df456270fa781a9aaca881382b72a25976401b39d0f9c4a2157401d0fd69a2a7512b1346880c2a630c255a8b84ce6fd1d654

  • SSDEEP

    3072:wRKTo/05Wg0tQ9nLHbB9WBJiBs2HWWEaPGJm9uqc:wRTi4QxL7B9WBJi+yWWEaUNl

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\543ead6adbf9d0867a1905c3746ac316d37682edb9d6c9ae9c5a82cb4d40d503.exe
    "C:\Users\Admin\AppData\Local\Temp\543ead6adbf9d0867a1905c3746ac316d37682edb9d6c9ae9c5a82cb4d40d503.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\hhwat.exe
      "C:\Users\Admin\hhwat.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hhwat.exe

    Filesize

    200KB

    MD5

    a6246dca49de8fb95e9258b6b3f8a112

    SHA1

    d534714c913f03658163320783d4f881d409a8e0

    SHA256

    c6929f0c5c5e6771871a065862541fe5a83fa7de7ba2c532881c85100c0f2f6b

    SHA512

    ab0e9ef19bd91f158daa08f006a6d9d3f2964b9bb748b9b11a2d8d396c5f8bf8f29d374a76f7c4ad6b7f643be80ad1b2d0a84914b50bc4a863302e8a16e9b891

  • C:\Users\Admin\hhwat.exe

    Filesize

    200KB

    MD5

    a6246dca49de8fb95e9258b6b3f8a112

    SHA1

    d534714c913f03658163320783d4f881d409a8e0

    SHA256

    c6929f0c5c5e6771871a065862541fe5a83fa7de7ba2c532881c85100c0f2f6b

    SHA512

    ab0e9ef19bd91f158daa08f006a6d9d3f2964b9bb748b9b11a2d8d396c5f8bf8f29d374a76f7c4ad6b7f643be80ad1b2d0a84914b50bc4a863302e8a16e9b891

  • memory/2748-134-0x0000000000000000-mapping.dmp