Analysis

  • max time kernel
    158s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 13:31

General

  • Target

    8f0ce924cf99add1c02fd5ae0ebd073c5a4bea60ebf8798d1be07b729adfc620.exe

  • Size

    100KB

  • MD5

    05949a8d7d80e87ef5575b817ed2d6b3

  • SHA1

    0fb46f1be576108615bee32910cf2ee4f91a18fe

  • SHA256

    8f0ce924cf99add1c02fd5ae0ebd073c5a4bea60ebf8798d1be07b729adfc620

  • SHA512

    3c6316267290a780ca9770afbe1457a5263d88476be7686b12d977cde1d37ede3b0f3f14436b752260dde8a571490ecb77ed89fb7c01194c6543812edddc1feb

  • SSDEEP

    1536:nFHi0gNDp4BNRXAEwqScgDz0Bg2PDXJRde/SwvFMYVwC+QaMnoXjLl06d:R64zDfDXJVI+oo3m6d

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f0ce924cf99add1c02fd5ae0ebd073c5a4bea60ebf8798d1be07b729adfc620.exe
    "C:\Users\Admin\AppData\Local\Temp\8f0ce924cf99add1c02fd5ae0ebd073c5a4bea60ebf8798d1be07b729adfc620.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\lwpis.exe
      "C:\Users\Admin\lwpis.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lwpis.exe

    Filesize

    100KB

    MD5

    a0becbb6d9fc81ca069f80dfce36d563

    SHA1

    9800e2e34e9d07689ec502fe4bd61482f8cf05e5

    SHA256

    c4ab34809369acbdd9cd0bbf181209ce402e9d811d06c72c3952155c59b9a65c

    SHA512

    bd128719237e9f1777bc2e500d2f09355092d5b1bb855f1f3e7c6c857d4484d4191849292a34053ec232fb02b2807ecc4dce8ea85edc086451cad57231b74b2f

  • C:\Users\Admin\lwpis.exe

    Filesize

    100KB

    MD5

    a0becbb6d9fc81ca069f80dfce36d563

    SHA1

    9800e2e34e9d07689ec502fe4bd61482f8cf05e5

    SHA256

    c4ab34809369acbdd9cd0bbf181209ce402e9d811d06c72c3952155c59b9a65c

    SHA512

    bd128719237e9f1777bc2e500d2f09355092d5b1bb855f1f3e7c6c857d4484d4191849292a34053ec232fb02b2807ecc4dce8ea85edc086451cad57231b74b2f