Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 22:43

General

  • Target

    c37bc45f3b7433aaccae7ecf9d94c7f9a67067957cbfd0eeae207736ede0b046.exe

  • Size

    152KB

  • MD5

    d850d96971c625ea22306d37cfe7e8a8

  • SHA1

    5f909cc03a269e7931e13a7316646d86c114e61f

  • SHA256

    c37bc45f3b7433aaccae7ecf9d94c7f9a67067957cbfd0eeae207736ede0b046

  • SHA512

    77ce2e77536df63582d5f8f74a2d984c46246b9acd595b9a6e0d5efe245756e357368c360524f3e0cf7d82208a43e3bf6c2fcc5b845dfea856699b275e7a76b5

  • SSDEEP

    3072:4MGKPYYh0ZC7+7DxNUbaxIcz93bOButK+Fov:h+7DxVh3bHiv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c37bc45f3b7433aaccae7ecf9d94c7f9a67067957cbfd0eeae207736ede0b046.exe
    "C:\Users\Admin\AppData\Local\Temp\c37bc45f3b7433aaccae7ecf9d94c7f9a67067957cbfd0eeae207736ede0b046.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\hauuc.exe
      "C:\Users\Admin\hauuc.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3156

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\hauuc.exe

          Filesize

          152KB

          MD5

          3f20c7bcdb09c627a65d25c2a0a2ae2d

          SHA1

          492090c478e62597867fe3d404a2ec7721282a8a

          SHA256

          b79e63086b2fe82730f580ea2070a51126a7fb52c748e76a209f3ac30bc1d42f

          SHA512

          e8461a3c1f5cef33bdc023383520ddc734deee1a7924799c95fa6f87ff695deed761b691cce83e083413b7176548b3d76d4ded9c2a145e09d8283961724f8002

        • C:\Users\Admin\hauuc.exe

          Filesize

          152KB

          MD5

          3f20c7bcdb09c627a65d25c2a0a2ae2d

          SHA1

          492090c478e62597867fe3d404a2ec7721282a8a

          SHA256

          b79e63086b2fe82730f580ea2070a51126a7fb52c748e76a209f3ac30bc1d42f

          SHA512

          e8461a3c1f5cef33bdc023383520ddc734deee1a7924799c95fa6f87ff695deed761b691cce83e083413b7176548b3d76d4ded9c2a145e09d8283961724f8002