Analysis

  • max time kernel
    196s
  • max time network
    218s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 03:04

General

  • Target

    926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe

  • Size

    228KB

  • MD5

    2dc8df6240a9550c9b27a9a933a48d8d

  • SHA1

    c102eaa3831a098b7802125c6b0e932ad78c8dba

  • SHA256

    926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c

  • SHA512

    0608a020dc5bd449320d2b317a658df5452a2bf7accddfa7d68abe377c2116ae6bc0ece9ec467e8d12e9d531fbf3c7c4f614d435b8c4fc359768fc73478acdde

  • SSDEEP

    6144:Kmf3PFKs7aFwKWwalhrEqxF6snji81RUinKZHg/9F:KmfPhAmZIH+H

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe
    "C:\Users\Admin\AppData\Local\Temp\926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Users\Admin\lgred.exe
      "C:\Users\Admin\lgred.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5004

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\lgred.exe

          Filesize

          228KB

          MD5

          f64186805f4a37596ba7d0b7ff334101

          SHA1

          8c177aac225eac38985471ba9e4a1d381c8901e0

          SHA256

          0c6d0ce21a5ff08ed9b99c408125fdab8019ca36de435fdd749b7ed569b5412b

          SHA512

          ee8f438aef2692627028b744a05bac1067d28ec479e758aded39f13f50abfce081d0228ee5e98efcad87b404ca6a9892c895189524fa3e873f6c5b598272651d

        • C:\Users\Admin\lgred.exe

          Filesize

          228KB

          MD5

          f64186805f4a37596ba7d0b7ff334101

          SHA1

          8c177aac225eac38985471ba9e4a1d381c8901e0

          SHA256

          0c6d0ce21a5ff08ed9b99c408125fdab8019ca36de435fdd749b7ed569b5412b

          SHA512

          ee8f438aef2692627028b744a05bac1067d28ec479e758aded39f13f50abfce081d0228ee5e98efcad87b404ca6a9892c895189524fa3e873f6c5b598272651d