Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 03:37

General

  • Target

    a071ccc8ff423399e5ed3ebee624a94cc34320733979c27ebca642863ce643fb.exe

  • Size

    220KB

  • MD5

    e90b745c778cec128f9d417fabf77cdc

  • SHA1

    8ab69032568673c40f4ee2d1f5b5ced734f0459f

  • SHA256

    a071ccc8ff423399e5ed3ebee624a94cc34320733979c27ebca642863ce643fb

  • SHA512

    1e61a2804cc104b1e404e49593a20a2c4fa1062f734f1eefd966b6999ecf0eddad749b781419b88e99b38d79d9eb5bd9a509dda97d7c349ed306ba51b528ae1e

  • SSDEEP

    3072:0+Ougkr8YUL4qx9RIHgil3UuhSa3U3dD8d6Oy+MIrnj3J+NB:VORko15x9SHVeOj0

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a071ccc8ff423399e5ed3ebee624a94cc34320733979c27ebca642863ce643fb.exe
    "C:\Users\Admin\AppData\Local\Temp\a071ccc8ff423399e5ed3ebee624a94cc34320733979c27ebca642863ce643fb.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Users\Admin\lioatey.exe
      "C:\Users\Admin\lioatey.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lioatey.exe

    Filesize

    220KB

    MD5

    123f55af2b87c420b0f586b938aa579d

    SHA1

    1e40fd38c64c61e2fe77fecf383fd0402732162c

    SHA256

    bdd32413f307dd696aca57f5bbdd9c6f4d3e050dfbb157cada77bda64d2429bc

    SHA512

    20fd29e91cf62dc26a867bb065055707284d21800001be51a63373d274fe321dfb92e17d23d98f833aa7fe3e492236a98e0a07b4b95e38bad84bfa03d506367d

  • C:\Users\Admin\lioatey.exe

    Filesize

    220KB

    MD5

    123f55af2b87c420b0f586b938aa579d

    SHA1

    1e40fd38c64c61e2fe77fecf383fd0402732162c

    SHA256

    bdd32413f307dd696aca57f5bbdd9c6f4d3e050dfbb157cada77bda64d2429bc

    SHA512

    20fd29e91cf62dc26a867bb065055707284d21800001be51a63373d274fe321dfb92e17d23d98f833aa7fe3e492236a98e0a07b4b95e38bad84bfa03d506367d