Analysis

  • max time kernel
    151s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:14

General

  • Target

    b469fce9477dc74bcf096ead1bd639ea410a649033dd98da595faeb9198f4f86.exe

  • Size

    260KB

  • MD5

    6b44d414afcf789ba4bbb6aa681768a9

  • SHA1

    ee80cabfb1f64c3d79bb1e47003324c073b8b20d

  • SHA256

    b469fce9477dc74bcf096ead1bd639ea410a649033dd98da595faeb9198f4f86

  • SHA512

    401b21d08ac645da52ce11d8d4e00ab6a169ea1fd04ad45b98c4f9a46cce71c11d93ef7686bfeaeb05f82462a2c44bda14a94826dbc42f88a3e1437363e9e612

  • SSDEEP

    6144:hjOxrVG3zzyXcM9ZoxtoFIZ93Cv8A/DPPiZi6Y:CIzzyXcM9ZoxtoFIZ93Cv8A/DXaY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b469fce9477dc74bcf096ead1bd639ea410a649033dd98da595faeb9198f4f86.exe
    "C:\Users\Admin\AppData\Local\Temp\b469fce9477dc74bcf096ead1bd639ea410a649033dd98da595faeb9198f4f86.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\kazum.exe
      "C:\Users\Admin\kazum.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kazum.exe

    Filesize

    260KB

    MD5

    b9242edad9e7579d83435c5109eeb2ee

    SHA1

    2bde6f3e13937c30da8d1074254d7b36f48b9b8a

    SHA256

    c2b52ddacdab07416be49f40060ee143346654d86829b483141657f88c4a6c2a

    SHA512

    50e478e1e17f376e32ac4d8dc0c2273d9052bc1cf933b7270007f130b5ad53cf43b05feb8acd731fe1a31da8355ca419a45aa5b3bb0b92c19f4f03792afe506c

  • C:\Users\Admin\kazum.exe

    Filesize

    260KB

    MD5

    b9242edad9e7579d83435c5109eeb2ee

    SHA1

    2bde6f3e13937c30da8d1074254d7b36f48b9b8a

    SHA256

    c2b52ddacdab07416be49f40060ee143346654d86829b483141657f88c4a6c2a

    SHA512

    50e478e1e17f376e32ac4d8dc0c2273d9052bc1cf933b7270007f130b5ad53cf43b05feb8acd731fe1a31da8355ca419a45aa5b3bb0b92c19f4f03792afe506c

  • memory/936-141-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/936-142-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1180-132-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1180-135-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB