Analysis

  • max time kernel
    122s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 22:58

General

  • Target

    a7748efca01ee6557ce2b5594b4f9a3246667f0c35b98dd8af00ee235f49aa68.exe

  • Size

    88KB

  • MD5

    5d2a91a6e7ed47ee91aeada4679d1f53

  • SHA1

    4d32b7895a153c2b030505b000076d883ea25a15

  • SHA256

    a7748efca01ee6557ce2b5594b4f9a3246667f0c35b98dd8af00ee235f49aa68

  • SHA512

    24bdb12b772245eaddca748657b1681c775f401e4770c54f1981f800ac008e36dc4e32aa170a266c31f7bbe55ef0cb5684e79f25b674cea14c6126b6d0476074

  • SSDEEP

    1536:ekUDdsDW1pLDcw3Hr+PaGme76FrknzKLqOP:7UDyDlOFonzK9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7748efca01ee6557ce2b5594b4f9a3246667f0c35b98dd8af00ee235f49aa68.exe
    "C:\Users\Admin\AppData\Local\Temp\a7748efca01ee6557ce2b5594b4f9a3246667f0c35b98dd8af00ee235f49aa68.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Users\Admin\laedeoq.exe
      "C:\Users\Admin\laedeoq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\laedeoq.exe

    Filesize

    88KB

    MD5

    b06dff7911b5607bc199b3686cea0398

    SHA1

    c9cd803c02f3766f3a728b24b448871f4f235ffd

    SHA256

    eeaaa0919ed892dcb04cd0a2e8c67dc7924794a8fa3d0a31513dbd1e87e98471

    SHA512

    2c3533d93dbb909f814d60f1f41b5cf382eb044e6582c0a66f7eab116e68cc5b902460c71eb315ad90b00434576514a8bbf5d41d4ff1bafdc4f71f343f68b32d

  • C:\Users\Admin\laedeoq.exe

    Filesize

    88KB

    MD5

    b06dff7911b5607bc199b3686cea0398

    SHA1

    c9cd803c02f3766f3a728b24b448871f4f235ffd

    SHA256

    eeaaa0919ed892dcb04cd0a2e8c67dc7924794a8fa3d0a31513dbd1e87e98471

    SHA512

    2c3533d93dbb909f814d60f1f41b5cf382eb044e6582c0a66f7eab116e68cc5b902460c71eb315ad90b00434576514a8bbf5d41d4ff1bafdc4f71f343f68b32d

  • memory/3852-134-0x0000000000000000-mapping.dmp