Analysis

  • max time kernel
    151s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 17:01

General

  • Target

    cdb7b7e2b55b61760257a47caecceb9aa032da958a43ac349e43f95542b7286d.exe

  • Size

    104KB

  • MD5

    824d03e3300b4a10b50cd114b4967572

  • SHA1

    8dca80d35a007df51b75d102a8a2ed93c328f3b9

  • SHA256

    cdb7b7e2b55b61760257a47caecceb9aa032da958a43ac349e43f95542b7286d

  • SHA512

    ec3bf981ee6db8661d90cdbac8f85ce6a9dbbf74588df16dcc9a7d9d65432449438a2ed0aeae44fbe6620641dd6efdcd9e4d783c7d7fdaedb3ed3af9e0a3338c

  • SSDEEP

    1536:QvLRvx+u3s+HBchhQKNIqpOcQv0sTEFSocloXjLl03F:Wq+eiKNZJQv0sTNo3m3F

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdb7b7e2b55b61760257a47caecceb9aa032da958a43ac349e43f95542b7286d.exe
    "C:\Users\Admin\AppData\Local\Temp\cdb7b7e2b55b61760257a47caecceb9aa032da958a43ac349e43f95542b7286d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\hiubeaf.exe
      "C:\Users\Admin\hiubeaf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hiubeaf.exe

    Filesize

    104KB

    MD5

    e942bf121b40b720f096cf0771a384a0

    SHA1

    35be73bd5e6ef6e4d2f665dcfede0860945cb00b

    SHA256

    636c4d71483069cba5924aaf94755c6ffed241f32a7df3c46c2dd50ce109d504

    SHA512

    102f106d82647d053e21408185698b5c5ed2894f3ad1a3eb52b0429b2e98a9c5b9472ccf69414a31c44d4b27186b3cafce5d4ec45e3df24cbe0cdfae3253b75a

  • C:\Users\Admin\hiubeaf.exe

    Filesize

    104KB

    MD5

    e942bf121b40b720f096cf0771a384a0

    SHA1

    35be73bd5e6ef6e4d2f665dcfede0860945cb00b

    SHA256

    636c4d71483069cba5924aaf94755c6ffed241f32a7df3c46c2dd50ce109d504

    SHA512

    102f106d82647d053e21408185698b5c5ed2894f3ad1a3eb52b0429b2e98a9c5b9472ccf69414a31c44d4b27186b3cafce5d4ec45e3df24cbe0cdfae3253b75a