Analysis

  • max time kernel
    172s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 22:55

General

  • Target

    adde0ae6f0943c890fb523048e2cd0d35305fc9804425b407b205314bc8ebad4.exe

  • Size

    152KB

  • MD5

    98915848d0fb84bfa2bb89d53ec4e13b

  • SHA1

    7a0ac5509333dea8b915d91ac9e50ba97c6a47b1

  • SHA256

    adde0ae6f0943c890fb523048e2cd0d35305fc9804425b407b205314bc8ebad4

  • SHA512

    22e8a0da2c29991f1fae969cb231aa973bead8c12ce284d2cd303296b9e7b9f9bf44d23540a19ec67d34bc2aea3e396924a97a1c97bbf4e246e73822b1343945

  • SSDEEP

    3072:LmlHPTYhjIV+7MxJUbaxI3zQyzLBuT+Hog:C+7Mxa0yzUg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adde0ae6f0943c890fb523048e2cd0d35305fc9804425b407b205314bc8ebad4.exe
    "C:\Users\Admin\AppData\Local\Temp\adde0ae6f0943c890fb523048e2cd0d35305fc9804425b407b205314bc8ebad4.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\fazut.exe
      "C:\Users\Admin\fazut.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3472

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fazut.exe

    Filesize

    152KB

    MD5

    4bb39e9374e9185549d5b9256a8b17af

    SHA1

    05091b89c31fb3611630a4990d477ef149a94fee

    SHA256

    3118a6e93c0e8964e16dae446da4647d40ca88bad7eb10e6fbf59806dd231bbe

    SHA512

    7792a638f4075b76e3cc5fce08061d067425faca79cef9dde45472a9bc24f46c047cd488249a3aa41790c446a87b4b1fc891392a8c537b820dc58bbb905c909d

  • C:\Users\Admin\fazut.exe

    Filesize

    152KB

    MD5

    4bb39e9374e9185549d5b9256a8b17af

    SHA1

    05091b89c31fb3611630a4990d477ef149a94fee

    SHA256

    3118a6e93c0e8964e16dae446da4647d40ca88bad7eb10e6fbf59806dd231bbe

    SHA512

    7792a638f4075b76e3cc5fce08061d067425faca79cef9dde45472a9bc24f46c047cd488249a3aa41790c446a87b4b1fc891392a8c537b820dc58bbb905c909d