Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 19:25

General

  • Target

    ab5334e9434094ec9fa6ed7e165267aef6c3aebe0ffeeda5a098f7566fc4e847.exe

  • Size

    100KB

  • MD5

    869a268e3c2d0787f5315b461862b9c1

  • SHA1

    3e2feb74abd5530760347da6c6a8331601a38c3f

  • SHA256

    ab5334e9434094ec9fa6ed7e165267aef6c3aebe0ffeeda5a098f7566fc4e847

  • SHA512

    737eeb41002bf2a7cc05d6f9f807025d1a005dfcd37af7b3cb0b2257837500a446f3d87211d2d224f426a3c7c6e0ef98daefbb215973b4389d1d53358c41db4c

  • SSDEEP

    1536:CvWccX220mQmncxJKIRGWcOUP7vXArnY1ZqAefzyesiNIjP:SYQmnPNAfzyeJCP

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab5334e9434094ec9fa6ed7e165267aef6c3aebe0ffeeda5a098f7566fc4e847.exe
    "C:\Users\Admin\AppData\Local\Temp\ab5334e9434094ec9fa6ed7e165267aef6c3aebe0ffeeda5a098f7566fc4e847.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\looxaz.exe
      "C:\Users\Admin\looxaz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4224

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\looxaz.exe

    Filesize

    100KB

    MD5

    8b97e6cf6ed7c08c182ef49999a4ba98

    SHA1

    e6cedb0b11363e6251fa686bd2c2602472d995dd

    SHA256

    cdc47bf171a96c4e8842d2f19800ce58c85b8996e8892b60939023f0c21170b7

    SHA512

    af5190de9c42246cb6bb469342ba9895726919c57f0da5c629c3cf42204afd6a8da643aa2c5d33c6085bbd0c309288bff75dd3972cb78f15dddbef24cf3dbf65

  • C:\Users\Admin\looxaz.exe

    Filesize

    100KB

    MD5

    8b97e6cf6ed7c08c182ef49999a4ba98

    SHA1

    e6cedb0b11363e6251fa686bd2c2602472d995dd

    SHA256

    cdc47bf171a96c4e8842d2f19800ce58c85b8996e8892b60939023f0c21170b7

    SHA512

    af5190de9c42246cb6bb469342ba9895726919c57f0da5c629c3cf42204afd6a8da643aa2c5d33c6085bbd0c309288bff75dd3972cb78f15dddbef24cf3dbf65