Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 16:53

General

  • Target

    e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe

  • Size

    104KB

  • MD5

    44476fddeb066870dc7601dfde7610e0

  • SHA1

    40fc9b4cefc2d9a49edff906b718f57de57fefc5

  • SHA256

    e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a

  • SHA512

    414ca9d7b2995112283d4412b3ecf1e12d51f6130e73fb751a8f2e7051e83f4cdf87da213f5c749affa743c848106431e40b8f3ad1822eff29cb5224f31c9ea9

  • SSDEEP

    1536:vCS6Njjtm+HBc+hFKNIqpOGQvLsTZF6oc9oXjLl0Ii:qe+FrKNZ3QvLsTMo3mIi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe
    "C:\Users\Admin\AppData\Local\Temp\e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\rueapom.exe
      "C:\Users\Admin\rueapom.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3248

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rueapom.exe

    Filesize

    104KB

    MD5

    61d2772b639e57f51044d51e99929ccc

    SHA1

    7b3474595d49d2d061cf3afb8ca0194f82afd260

    SHA256

    a8875ba8eb3b7a5613c3dde4f8f84239fbf44790b8c25d9b2559a1e199a2a7fd

    SHA512

    c41adb4a1ff8172388c737b7ba835f664165c424ca4fe70cf389f18dc63b37e90246fa7ddef2c707f2338f50fb9ee6a7a1d4bc8e89ae8a88b8691394e9d60ebd

  • C:\Users\Admin\rueapom.exe

    Filesize

    104KB

    MD5

    61d2772b639e57f51044d51e99929ccc

    SHA1

    7b3474595d49d2d061cf3afb8ca0194f82afd260

    SHA256

    a8875ba8eb3b7a5613c3dde4f8f84239fbf44790b8c25d9b2559a1e199a2a7fd

    SHA512

    c41adb4a1ff8172388c737b7ba835f664165c424ca4fe70cf389f18dc63b37e90246fa7ddef2c707f2338f50fb9ee6a7a1d4bc8e89ae8a88b8691394e9d60ebd