Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 19:24

General

  • Target

    7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe

  • Size

    140KB

  • MD5

    060999cc41b27fff07ec01d002ad5de0

  • SHA1

    1435237348d286d474f7aa569632db44d53c07dc

  • SHA256

    7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612

  • SHA512

    05b11e35a2548d9629dc35ed36776520869e4a99e1fd801d72d77abc10b693c9f9ba8f815c2a96142b235a2dee8038512796e01c073bf60dd634a9576106c67e

  • SSDEEP

    1536:xu0go4oNyLV4Ji2+6wl4fAsyCsJ2AyJOSfNifNuzyWh4oQ/hKeXsjEFInm:biCi2+6CXfCZAyJH1i1uz34oQZiEYm

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe
    "C:\Users\Admin\AppData\Local\Temp\7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Users\Admin\tauufid.exe
      "C:\Users\Admin\tauufid.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tauufid.exe

    Filesize

    140KB

    MD5

    ae1e040c9f6ea9358e919df652febc2d

    SHA1

    c9aeae3a4ed2da1e8a51e8aeb779eb1097dbadf3

    SHA256

    5bc850cbe9696598e546306f7f35aff9a814c508930f2c36dbd60aff717e61b9

    SHA512

    7fbf21a8de5bf22aea8eca25bfc92b5e9e4184e7cb5df41627009adf030198c4bb7a13cf8fae4006408b06aa44c6c681335bc2614a24f5b1e5177c936ddddbee

  • C:\Users\Admin\tauufid.exe

    Filesize

    140KB

    MD5

    ae1e040c9f6ea9358e919df652febc2d

    SHA1

    c9aeae3a4ed2da1e8a51e8aeb779eb1097dbadf3

    SHA256

    5bc850cbe9696598e546306f7f35aff9a814c508930f2c36dbd60aff717e61b9

    SHA512

    7fbf21a8de5bf22aea8eca25bfc92b5e9e4184e7cb5df41627009adf030198c4bb7a13cf8fae4006408b06aa44c6c681335bc2614a24f5b1e5177c936ddddbee

  • memory/4596-134-0x0000000000000000-mapping.dmp