Analysis

  • max time kernel
    154s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 16:57

General

  • Target

    d845ceaab81a33bf6407938c1d4798412290d44a79644c86821d2b9ed8a62ccf.exe

  • Size

    224KB

  • MD5

    12414cfe3aaf9d0957f3519ced587e49

  • SHA1

    811e1a355db8089cae9bd70985478628a5f23491

  • SHA256

    d845ceaab81a33bf6407938c1d4798412290d44a79644c86821d2b9ed8a62ccf

  • SHA512

    74c57ab86e1ef6a352a988b8ebfe8c75c84a37066010829e84a891495d870763df026e3bfc429661dc380ff440d3ef38e0c67f768a9c47221ff9f434465a217b

  • SSDEEP

    3072:FUHQW1D0tQ9nLHbB9W+k9ZJgImCguOelGqk:FUD4QxL7B9W+2JgIPgql

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d845ceaab81a33bf6407938c1d4798412290d44a79644c86821d2b9ed8a62ccf.exe
    "C:\Users\Admin\AppData\Local\Temp\d845ceaab81a33bf6407938c1d4798412290d44a79644c86821d2b9ed8a62ccf.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Users\Admin\miozie.exe
      "C:\Users\Admin\miozie.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4804

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\miozie.exe

          Filesize

          224KB

          MD5

          35517d36a843b8f30bf9eea9f045944f

          SHA1

          7e432687e4a91ad6f8a47a3536af94c7f1d970a9

          SHA256

          6e2829218f8cc69c55f7fccba6eb10b3900695f9e29c068d61a609354dc5681a

          SHA512

          4c409f8428254a6d5723150472021f713bd6fca402faaeacf1ad0f1faba680726236efce2f985e968c5b1b8b0fd10690e80a2dea058c94ce44289f06b932a909

        • C:\Users\Admin\miozie.exe

          Filesize

          224KB

          MD5

          35517d36a843b8f30bf9eea9f045944f

          SHA1

          7e432687e4a91ad6f8a47a3536af94c7f1d970a9

          SHA256

          6e2829218f8cc69c55f7fccba6eb10b3900695f9e29c068d61a609354dc5681a

          SHA512

          4c409f8428254a6d5723150472021f713bd6fca402faaeacf1ad0f1faba680726236efce2f985e968c5b1b8b0fd10690e80a2dea058c94ce44289f06b932a909

        • memory/4804-141-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/4804-142-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/4812-132-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/4812-135-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB