Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 22:59

General

  • Target

    3039034a150187f22416e28c2f8f1410c01bec982f3535d7f89863cb14cbf5c3.exe

  • Size

    100KB

  • MD5

    7d0c314d2a29339166d1b2d51a23e09d

  • SHA1

    d1a00709261c43933c19111828a355f4df9d0a12

  • SHA256

    3039034a150187f22416e28c2f8f1410c01bec982f3535d7f89863cb14cbf5c3

  • SHA512

    cb6e71a9042faab20dbaf03aa649721516456343b75a5dd8848821ad24ac4017f396788d3d95bcb158cb8d25c52503e83b748c526b3f35f9871861a712816f8b

  • SSDEEP

    1536:zD17jQlzlHP1UtGgH0tCSoe11z3yqM4/0bucdU/mNYjiZcHvIyi68q7+FSlDKBww:vqlzFP1U1ju0QK

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3039034a150187f22416e28c2f8f1410c01bec982f3535d7f89863cb14cbf5c3.exe
    "C:\Users\Admin\AppData\Local\Temp\3039034a150187f22416e28c2f8f1410c01bec982f3535d7f89863cb14cbf5c3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\mgkoej.exe
      "C:\Users\Admin\mgkoej.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\mgkoej.exe

    Filesize

    100KB

    MD5

    ab8871613d18c85fd21f8f52a75cb377

    SHA1

    bc8b931b275068901b64df35f1af1e5c586b86d5

    SHA256

    a93f2ae5ac55ca4664aeb38b4f1baf471d07bb1ee21dfc8c2e175612b00996e4

    SHA512

    8d493fe4c6c413d5ea8ccf50c07060f8a9f6722a10d3be1ee29fd22ddaa88525c0b63d08396e17ef780bfe886f1534f96342db56f4a410a985055eb3a48e9f51

  • C:\Users\Admin\mgkoej.exe

    Filesize

    100KB

    MD5

    ab8871613d18c85fd21f8f52a75cb377

    SHA1

    bc8b931b275068901b64df35f1af1e5c586b86d5

    SHA256

    a93f2ae5ac55ca4664aeb38b4f1baf471d07bb1ee21dfc8c2e175612b00996e4

    SHA512

    8d493fe4c6c413d5ea8ccf50c07060f8a9f6722a10d3be1ee29fd22ddaa88525c0b63d08396e17ef780bfe886f1534f96342db56f4a410a985055eb3a48e9f51