Analysis

  • max time kernel
    364s
  • max time network
    454s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 23:41

General

  • Target

    56659cb813be9b297986f3b54a656d79a2e97e423db31de3db2e5039b835325b.exe

  • Size

    168KB

  • MD5

    aeba923aa67744ef6570c3c770a4e07f

  • SHA1

    7d4dc3567ca11550211bb668cbd2e041101ea3eb

  • SHA256

    56659cb813be9b297986f3b54a656d79a2e97e423db31de3db2e5039b835325b

  • SHA512

    9a97e1d408276e6a1ee392eb93366c7ea81981640c4e8202bc91102ed6c875d26618e59486215676eec37c545e80e91c8f2515d01e2f17020ebf1ae18d799722

  • SSDEEP

    1536:xAFlHooXxTaSfm8UI+FQZAq7UjbJw5aCUZeBB++7XVFfFVE/9jMhmqLBzmxI:OlHooXxYUZvUH2aZZer++7XVb5gI

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56659cb813be9b297986f3b54a656d79a2e97e423db31de3db2e5039b835325b.exe
    "C:\Users\Admin\AppData\Local\Temp\56659cb813be9b297986f3b54a656d79a2e97e423db31de3db2e5039b835325b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Users\Admin\moogu.exe
      "C:\Users\Admin\moogu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\moogu.exe

    Filesize

    168KB

    MD5

    81667fa375649356748ce928f3b159c6

    SHA1

    defd35236f1b38348c978dde322a97c0dea94fc6

    SHA256

    1fb387853a3596ea39c79c424b7f5008017e3308af62a15b000e6f0a2665237d

    SHA512

    90d72028f2bdc734bc5713e93c09fca77395881d3ba3dbdc4f83f5023087381da6183248af185b1082e3717ed59de8113ad5c643da3f3acf5223767f2d46d50d

  • C:\Users\Admin\moogu.exe

    Filesize

    168KB

    MD5

    81667fa375649356748ce928f3b159c6

    SHA1

    defd35236f1b38348c978dde322a97c0dea94fc6

    SHA256

    1fb387853a3596ea39c79c424b7f5008017e3308af62a15b000e6f0a2665237d

    SHA512

    90d72028f2bdc734bc5713e93c09fca77395881d3ba3dbdc4f83f5023087381da6183248af185b1082e3717ed59de8113ad5c643da3f3acf5223767f2d46d50d