Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 19:31

General

  • Target

    287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe

  • Size

    84KB

  • MD5

    187ebed20ef31dbf7e7fe6fce1feb28e

  • SHA1

    10f6959294838dd05cfca8760b65c1761cc9bd09

  • SHA256

    287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426

  • SHA512

    53b334b0918849e3eeffa1b748109298b4cd0154c97715275adb679decee33568d3e7b2390ca1353382e6f7eef2fb9a9028ad6418c22e43e214126bb7c55227f

  • SSDEEP

    768:DyV+hOvo/OswzKvgO0jAIWi3KEyUhL7b7Yqlf4JwQltjmtTBHi7Alg:DoFvOyES76Ezh/vYlJwAitTB3lg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe
    "C:\Users\Admin\AppData\Local\Temp\287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\fueokij.exe
      "C:\Users\Admin\fueokij.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 1676
      2⤵
      • Program crash
      PID:1508
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5040 -ip 5040
    1⤵
      PID:1408

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\fueokij.exe

            Filesize

            84KB

            MD5

            022aff55990d5603b573b80b07d55d82

            SHA1

            ba609b2a250b92dd76c4326d0fb72bd5468ce16f

            SHA256

            f53d053d61c68bfdc7bcc2740059354bce8a7e23913c404858c9d003516a71f9

            SHA512

            6a762e75eafebe9e9ac9361866ba08173688af73b7684c7641c49e1ce9f824a6a948527b9bf7652ae8b39b2a6ceb4a5db10795a4dcdbc752775ae33c751f591d

          • C:\Users\Admin\fueokij.exe

            Filesize

            84KB

            MD5

            022aff55990d5603b573b80b07d55d82

            SHA1

            ba609b2a250b92dd76c4326d0fb72bd5468ce16f

            SHA256

            f53d053d61c68bfdc7bcc2740059354bce8a7e23913c404858c9d003516a71f9

            SHA512

            6a762e75eafebe9e9ac9361866ba08173688af73b7684c7641c49e1ce9f824a6a948527b9bf7652ae8b39b2a6ceb4a5db10795a4dcdbc752775ae33c751f591d