Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 23:20

General

  • Target

    6c880ae7c4d42650ee6ba6dd8e9e971f9cf4a532364fc83cf6efe54070371a11.exe

  • Size

    204KB

  • MD5

    1baa7c8a077d2bb486d82e2a7b0fcb60

  • SHA1

    44fdea9eae05bb0f51240e44c658bff49bd33e7a

  • SHA256

    6c880ae7c4d42650ee6ba6dd8e9e971f9cf4a532364fc83cf6efe54070371a11

  • SHA512

    cb7b1672ea4766b7657ab3f2f3eb1fe3c1ec5f348bdf58b577509cab30ea6d46593b23108653a9b5cea5ca42057a04a7ded400804d845e300fd2b4dd4f2f1152

  • SSDEEP

    3072:lyRb9GffGv4rPFQJcaitfdE1Y1wuUBcQZfYW:X42PFKc39diY1wcc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c880ae7c4d42650ee6ba6dd8e9e971f9cf4a532364fc83cf6efe54070371a11.exe
    "C:\Users\Admin\AppData\Local\Temp\6c880ae7c4d42650ee6ba6dd8e9e971f9cf4a532364fc83cf6efe54070371a11.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Users\Admin\puoeva.exe
      "C:\Users\Admin\puoeva.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\puoeva.exe

    Filesize

    204KB

    MD5

    a0b14c651361c74f3a5a47b5dba60534

    SHA1

    fc0f4f573a562c6fee5c41c519f023509382999a

    SHA256

    5ef5980b40f284342b42304b839f11c49a3de325d58ee9e36620f898544dbd5e

    SHA512

    08a439dc8235872843e3334ea8d164be702f5ab4abc7ad1bc991a6d44a9b9665e620f8aa497672bae3f253f15f093f351b443eb1884b1804fc8b91cf5e514962

  • C:\Users\Admin\puoeva.exe

    Filesize

    204KB

    MD5

    a0b14c651361c74f3a5a47b5dba60534

    SHA1

    fc0f4f573a562c6fee5c41c519f023509382999a

    SHA256

    5ef5980b40f284342b42304b839f11c49a3de325d58ee9e36620f898544dbd5e

    SHA512

    08a439dc8235872843e3334ea8d164be702f5ab4abc7ad1bc991a6d44a9b9665e620f8aa497672bae3f253f15f093f351b443eb1884b1804fc8b91cf5e514962