Analysis

  • max time kernel
    152s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 19:22

General

  • Target

    88b706949ba5a180d20e8b4291bd2de98b87f62bfe8a74181ebe8f533dddd91e.exe

  • Size

    232KB

  • MD5

    0b567b9b3e501cc33378112d785d3f1b

  • SHA1

    512cf0c8a070d24f8c14f40f235b7b3c7b89be0c

  • SHA256

    88b706949ba5a180d20e8b4291bd2de98b87f62bfe8a74181ebe8f533dddd91e

  • SHA512

    51b8109fbb9ad6e71fea9621d64b858373d92f646e088700605b71fec6d8cefc90c34a68cb198e64284ee6c0517ce3793e0612289cccd6c9f06240da3303e88e

  • SSDEEP

    6144:y23PFKs78g2KyEOaWEqxF6snji81RUinKdNObY:/Ph+mF9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88b706949ba5a180d20e8b4291bd2de98b87f62bfe8a74181ebe8f533dddd91e.exe
    "C:\Users\Admin\AppData\Local\Temp\88b706949ba5a180d20e8b4291bd2de98b87f62bfe8a74181ebe8f533dddd91e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Users\Admin\meixiew.exe
      "C:\Users\Admin\meixiew.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\meixiew.exe

    Filesize

    232KB

    MD5

    447400e13bf2ec8bd1c99602a5b0c38c

    SHA1

    3d4d693323d212d0431623fc9ec069bbd9f31aae

    SHA256

    01f7e5db2c8c276a64e9ecca814f4a3400bc40752ef0af154dc90a47896f1ce5

    SHA512

    e9e516ecb6eac217772dfdd1f6a7e6d8ff6548cda557a9e03fb44153305b5deee9af486ff17179b783711807c514a443086a3996041256b4c225b3dcd0f46a57

  • C:\Users\Admin\meixiew.exe

    Filesize

    232KB

    MD5

    447400e13bf2ec8bd1c99602a5b0c38c

    SHA1

    3d4d693323d212d0431623fc9ec069bbd9f31aae

    SHA256

    01f7e5db2c8c276a64e9ecca814f4a3400bc40752ef0af154dc90a47896f1ce5

    SHA512

    e9e516ecb6eac217772dfdd1f6a7e6d8ff6548cda557a9e03fb44153305b5deee9af486ff17179b783711807c514a443086a3996041256b4c225b3dcd0f46a57

  • memory/4864-134-0x0000000000000000-mapping.dmp