Analysis

  • max time kernel
    354s
  • max time network
    375s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 23:51

General

  • Target

    8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe

  • Size

    212KB

  • MD5

    fd6b7739e7699b6492f4e26b994309db

  • SHA1

    c97c253def97399dfda45c4424e5f68fd87299e2

  • SHA256

    8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c

  • SHA512

    5cbfb037d08a84505e3135db00039503a8ae0cf3c9810219f0b392890631d52a77c8f518db3c1b177c16fc95125f77220822110159dadbd1bfd92342a18ba444

  • SSDEEP

    3072:R9UB99PLzQsJhGYiNAcXOqQnys80/p5GomjRMEQYbLlmuPU+BfPc1rPU35pJucyU:RqBj2OqQn580/JXEJpc1rPXi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe
    "C:\Users\Admin\AppData\Local\Temp\8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Users\Admin\meayof.exe
      "C:\Users\Admin\meayof.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1260

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\meayof.exe

          Filesize

          212KB

          MD5

          cd667e681b530c33d25c53f21389f261

          SHA1

          4737701c8fb1863538ea8c522dabeeefcb7894f0

          SHA256

          2daa77c2794a3d0f25bc256bbc051a2975b706aea3b61d98a6c5e05777b3a06a

          SHA512

          4e7bbdba452fd0c812dc5a2b7e5624f00f2117587545bb47f0ad78475cc7e5a7cb0c8bd9030f0d0f1f9bd070fec43c8ccf646751123280feb563592390209746

        • C:\Users\Admin\meayof.exe

          Filesize

          212KB

          MD5

          cd667e681b530c33d25c53f21389f261

          SHA1

          4737701c8fb1863538ea8c522dabeeefcb7894f0

          SHA256

          2daa77c2794a3d0f25bc256bbc051a2975b706aea3b61d98a6c5e05777b3a06a

          SHA512

          4e7bbdba452fd0c812dc5a2b7e5624f00f2117587545bb47f0ad78475cc7e5a7cb0c8bd9030f0d0f1f9bd070fec43c8ccf646751123280feb563592390209746