Analysis

  • max time kernel
    174s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 09:00

General

  • Target

    ba6e61bf6527a84527711600e3a577a1f648308c8b0ba5aed09935dbed3f8fad.exe

  • Size

    1.5MB

  • MD5

    44337c0892b51caf7a8c361773f9b20a

  • SHA1

    5cb1c78ba10e533f3fd286a85d65da9713ab4c4a

  • SHA256

    ba6e61bf6527a84527711600e3a577a1f648308c8b0ba5aed09935dbed3f8fad

  • SHA512

    100aabac2017fc8bd8181e6ba7c232bf9a773c64cbec3225bd27da1ed13b28259f9e49fec065cc17808cf861465746c7a185b0452a971c1ff13ef927a9c88e92

  • SSDEEP

    24576:NM3q4FxNTcsDWDAG6R9CYu8ZnxuZm6i/hlY0MLZDRJweuaMTSDPoW:+37Fg167n1/LiLOcMTSbo

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 6 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba6e61bf6527a84527711600e3a577a1f648308c8b0ba5aed09935dbed3f8fad.exe
    "C:\Users\Admin\AppData\Local\Temp\ba6e61bf6527a84527711600e3a577a1f648308c8b0ba5aed09935dbed3f8fad.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Disables RegEdit via registry modification
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:1380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads