Analysis

  • max time kernel
    343s
  • max time network
    371s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 00:03

General

  • Target

    aa1cfe46d9b54db3949c266cd4ce10117f8d378218f66ca24a25bb3a71782266.exe

  • Size

    220KB

  • MD5

    a87c8859f8d19b580009f129e0e9e778

  • SHA1

    75eb0891453efc0914d8b18d54c048113c341a38

  • SHA256

    aa1cfe46d9b54db3949c266cd4ce10117f8d378218f66ca24a25bb3a71782266

  • SHA512

    c66a6f72875ead8776d7464da9dd5751bfbcd55e24051f07eb1395b54ebd21ef1cb6634cd8b08a503aa31376271bb792bc694d990d52a5a67d1b4cd2d5b82ec6

  • SSDEEP

    6144:TVRWWHn3oBlwEL2wKnvmb7/D26OzRnH/QUw3LsFItNkVFZmJuFxCwG:TVRrn3oBlwyKnvmb7/D26itwbsFgNk0f

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa1cfe46d9b54db3949c266cd4ce10117f8d378218f66ca24a25bb3a71782266.exe
    "C:\Users\Admin\AppData\Local\Temp\aa1cfe46d9b54db3949c266cd4ce10117f8d378218f66ca24a25bb3a71782266.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Users\Admin\lioaga.exe
      "C:\Users\Admin\lioaga.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lioaga.exe

    Filesize

    220KB

    MD5

    c469de2c061c75654dfdf824094d46bf

    SHA1

    fb504028e4cccebb0a4dc16da7e00bab1a83fc5a

    SHA256

    3f081956ec7310fe624a1272a921134d276bc35703352eaa48b32ea07a1c1341

    SHA512

    e08887778efecebb20b2cafab7ca91d3bdd543e4d5c4cdcf7018268e61d54bcefb29228f3f37b750856de1799b71ab102181cd01c3a685e77a27c79df61f3ca3

  • C:\Users\Admin\lioaga.exe

    Filesize

    220KB

    MD5

    c469de2c061c75654dfdf824094d46bf

    SHA1

    fb504028e4cccebb0a4dc16da7e00bab1a83fc5a

    SHA256

    3f081956ec7310fe624a1272a921134d276bc35703352eaa48b32ea07a1c1341

    SHA512

    e08887778efecebb20b2cafab7ca91d3bdd543e4d5c4cdcf7018268e61d54bcefb29228f3f37b750856de1799b71ab102181cd01c3a685e77a27c79df61f3ca3