Analysis

  • max time kernel
    153s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 17:33

General

  • Target

    83f5cf0e7d8db1a0e64d0b16d694ebd0fd82927565cdc56f1adfd352818d3432.exe

  • Size

    192KB

  • MD5

    826a11713bc00c76ef7777687253ed14

  • SHA1

    ac68949fa65f43d87c263af229b3d6e19a32aa50

  • SHA256

    83f5cf0e7d8db1a0e64d0b16d694ebd0fd82927565cdc56f1adfd352818d3432

  • SHA512

    9d2f6aa3434ffc775d07ceefa55c772214ae6a01aca291c4229ac5226e1f8c8d3ecece0e2fd58dc38d2ff4e9a37ea8f99a3a7e42520a8d7d2771097c9aba1381

  • SSDEEP

    1536:sqcG2Oaiaaaaat031AdQWB5kCFrWszRUOHFlQhzyLwVKftfVBiZHAPloFp5A2mbf:2OrW3kCFrWsF2eLbqx2994sUNm

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83f5cf0e7d8db1a0e64d0b16d694ebd0fd82927565cdc56f1adfd352818d3432.exe
    "C:\Users\Admin\AppData\Local\Temp\83f5cf0e7d8db1a0e64d0b16d694ebd0fd82927565cdc56f1adfd352818d3432.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\goipouz.exe
      "C:\Users\Admin\goipouz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4892

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\goipouz.exe

    Filesize

    192KB

    MD5

    472c40ad3dddf6b8beb6dbe21139120a

    SHA1

    0c34c7e5753893ffcdc6834a9f16c23ad8353c2c

    SHA256

    c36fa1d42ad022f8a057af7cfc577011bb81ef789c2cba14ed952cb3a7a7bea0

    SHA512

    001d20ea5a4308799982396deec944808591ba9cb756a22075419f41a9626dbf3be8f6783ee5bd24fa61a2f1946c0b1d47ac272264c6f0a7f9c7c9f06c2d71d3

  • C:\Users\Admin\goipouz.exe

    Filesize

    192KB

    MD5

    472c40ad3dddf6b8beb6dbe21139120a

    SHA1

    0c34c7e5753893ffcdc6834a9f16c23ad8353c2c

    SHA256

    c36fa1d42ad022f8a057af7cfc577011bb81ef789c2cba14ed952cb3a7a7bea0

    SHA512

    001d20ea5a4308799982396deec944808591ba9cb756a22075419f41a9626dbf3be8f6783ee5bd24fa61a2f1946c0b1d47ac272264c6f0a7f9c7c9f06c2d71d3

  • memory/4892-134-0x0000000000000000-mapping.dmp