Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 19:05

General

  • Target

    de50f76a9b80584e87063299a7a0edd734a343a6a41d7d776e55dcb508ef8792.exe

  • Size

    172KB

  • MD5

    437d273b3ee2db41f1b77f23ac1a5102

  • SHA1

    2119b1034ca4de401eaefdfcc777a8b8ffc12971

  • SHA256

    de50f76a9b80584e87063299a7a0edd734a343a6a41d7d776e55dcb508ef8792

  • SHA512

    8eec3021d8bd8daf26687879bad570319b662f2697d72283ceb8756a2cd6d96d1929954f4644e99a411ca21c592a77b060ac5fc7c10fa951324f04cb46096985

  • SSDEEP

    3072:1SFonoVD8oSx/mvXAFIFR7Nzim04f1fhLOG7GQiCLMt8Xt/Wv6mgem:1coUD8oSx/mvXAFIFR7N7DfhhLOG7GQe

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de50f76a9b80584e87063299a7a0edd734a343a6a41d7d776e55dcb508ef8792.exe
    "C:\Users\Admin\AppData\Local\Temp\de50f76a9b80584e87063299a7a0edd734a343a6a41d7d776e55dcb508ef8792.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\biepoo.exe
      "C:\Users\Admin\biepoo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\biepoo.exe

    Filesize

    172KB

    MD5

    71a8406a66d6b63e7118984ba6177258

    SHA1

    8d5457271e0fcaa515bf69092b44d90a93ac181d

    SHA256

    033ab2f5d5f15cd5f0887ebe67c21bd9bcf986dd18966f5f3280fa56f7006e95

    SHA512

    33500ab1557afe79fec22c2ac1960ca2de9ac97a599b1fca293e22b343586193923f2c06fd46fa95113235868bdd9f061db8f6e417fd9b8a86dd68c78b5afa6a

  • C:\Users\Admin\biepoo.exe

    Filesize

    172KB

    MD5

    71a8406a66d6b63e7118984ba6177258

    SHA1

    8d5457271e0fcaa515bf69092b44d90a93ac181d

    SHA256

    033ab2f5d5f15cd5f0887ebe67c21bd9bcf986dd18966f5f3280fa56f7006e95

    SHA512

    33500ab1557afe79fec22c2ac1960ca2de9ac97a599b1fca293e22b343586193923f2c06fd46fa95113235868bdd9f061db8f6e417fd9b8a86dd68c78b5afa6a

  • memory/2788-137-0x0000000000000000-mapping.dmp