Analysis

  • max time kernel
    152s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 16:47

General

  • Target

    fa5ea4ab54c6a6aff62ab151b846ba536ee0e6012ba2bdb1e7ffd51978cb201e.exe

  • Size

    92KB

  • MD5

    44ef4fd1cda72f5700324a0843743ab4

  • SHA1

    706ce783be4356a47dc01fac93f5fe6ff75cf223

  • SHA256

    fa5ea4ab54c6a6aff62ab151b846ba536ee0e6012ba2bdb1e7ffd51978cb201e

  • SHA512

    3a508d1031ad814b5b0dc253e9a961af43d85dc3936a3018cb1f32b942330bfbd831fad5947f4cd50620705eb15f254546b7ed64a6c6517e8af5883b4b624cb2

  • SSDEEP

    768:9VOh4jASZdr+KGz5BAtpm4eutfrWTVtTZ/BliKG1jiTa9McTfkQ3YBkZy:9PRdS6pm4aTZ5XG1jiTa9McrkQskZ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 46 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa5ea4ab54c6a6aff62ab151b846ba536ee0e6012ba2bdb1e7ffd51978cb201e.exe
    "C:\Users\Admin\AppData\Local\Temp\fa5ea4ab54c6a6aff62ab151b846ba536ee0e6012ba2bdb1e7ffd51978cb201e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Users\Admin\soioto.exe
      "C:\Users\Admin\soioto.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\soioto.exe

    Filesize

    92KB

    MD5

    6c62f0a987f88c30e91a8271663f1391

    SHA1

    02e5d4abd41dba0275135eaadeacffda5e3abcfc

    SHA256

    dfb8d7e7c2ae69dbaf30b3941b310124fdb1ae9594c4db1530dcc14db754acd5

    SHA512

    87c6cba2f011625e511a9c2b62af1cf62fd6c5fbca3e9b51dafb5be878962c1a1257389efc71d5dd3bb96654b9c703fa5818f738ecaa5ca87ef69fdf8ac56230

  • C:\Users\Admin\soioto.exe

    Filesize

    92KB

    MD5

    6c62f0a987f88c30e91a8271663f1391

    SHA1

    02e5d4abd41dba0275135eaadeacffda5e3abcfc

    SHA256

    dfb8d7e7c2ae69dbaf30b3941b310124fdb1ae9594c4db1530dcc14db754acd5

    SHA512

    87c6cba2f011625e511a9c2b62af1cf62fd6c5fbca3e9b51dafb5be878962c1a1257389efc71d5dd3bb96654b9c703fa5818f738ecaa5ca87ef69fdf8ac56230