Analysis

  • max time kernel
    194s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 11:34

General

  • Target

    adde0b932ab9830e1bf6094d81d55124970dfc0ffaaad8424e46e34584a5aa68.exe

  • Size

    284KB

  • MD5

    975d47f13d8d853ba7306000ecc5a2d6

  • SHA1

    1729c1f3899c8a2ec1982e474823af9434801b57

  • SHA256

    adde0b932ab9830e1bf6094d81d55124970dfc0ffaaad8424e46e34584a5aa68

  • SHA512

    e70605bba5552640f20f1c579c5a8f8119f3e03ef67dbc2ba7eea6f4d1d7d32399a3e5aedc83070c464c605e24828f2c616839d53fd406fbb2a3cf6bd9fea034

  • SSDEEP

    3072:/n+ynE0lSmpR1TmoNkMl4ymdu+sSi5KKGTKozEDGaKUa6xUgyX6lgq1Kx5RK1fY0:9E0UmVmoNkMl4ymdu+sSi5KKGsjO

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adde0b932ab9830e1bf6094d81d55124970dfc0ffaaad8424e46e34584a5aa68.exe
    "C:\Users\Admin\AppData\Local\Temp\adde0b932ab9830e1bf6094d81d55124970dfc0ffaaad8424e46e34584a5aa68.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Users\Admin\siwil.exe
      "C:\Users\Admin\siwil.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\siwil.exe

    Filesize

    284KB

    MD5

    4d38869bf830fc7e349cc46ba618109a

    SHA1

    0d9cb6e6a2dcdf35ffd35a57b4c03cd7192e7568

    SHA256

    421d0ee4a842a4030c06831a714870d467604e0435af34504340bddaf1c3150e

    SHA512

    e51e7b050f0410c00bf75324ce9c057adc0c75add52d3ffe57efd28eb661e03ac4042464ffa39cb82daed8ca190abed317a3ebb2fe8d4e428cad85a1e6b19a37

  • C:\Users\Admin\siwil.exe

    Filesize

    284KB

    MD5

    4d38869bf830fc7e349cc46ba618109a

    SHA1

    0d9cb6e6a2dcdf35ffd35a57b4c03cd7192e7568

    SHA256

    421d0ee4a842a4030c06831a714870d467604e0435af34504340bddaf1c3150e

    SHA512

    e51e7b050f0410c00bf75324ce9c057adc0c75add52d3ffe57efd28eb661e03ac4042464ffa39cb82daed8ca190abed317a3ebb2fe8d4e428cad85a1e6b19a37