Analysis

  • max time kernel
    166s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 19:38

General

  • Target

    6c40506ce4805ffb76851e552b3e3c44b603efdccfff547676e5a3f7f801dc3c.exe

  • Size

    200KB

  • MD5

    6720b4318b18bd8e3d1ab2c6fae70f64

  • SHA1

    2f4a2efd877c35a8b9b422281014901023cb73e7

  • SHA256

    6c40506ce4805ffb76851e552b3e3c44b603efdccfff547676e5a3f7f801dc3c

  • SHA512

    d173232f23ef80821c370bfb6793798e9b0967b0163a16e2a1bc73e8ed49e4ea59e85272305818d6e8bf643f6c911a705f70c1ddc0680ddfeb86358e2e307191

  • SSDEEP

    1536:7IEg52X9tyVQO8P8ychq8jlwjj3RJNEo/knRzdnynE7RldNEP8lijOezNIjnZd:kE/XelychFMzR3Ek65RldqzCnL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c40506ce4805ffb76851e552b3e3c44b603efdccfff547676e5a3f7f801dc3c.exe
    "C:\Users\Admin\AppData\Local\Temp\6c40506ce4805ffb76851e552b3e3c44b603efdccfff547676e5a3f7f801dc3c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\daeki.exe
      "C:\Users\Admin\daeki.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3512

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\daeki.exe

    Filesize

    200KB

    MD5

    c50dd73ae8b84624b0c3f48442a92103

    SHA1

    917d91b2126ec37fcfa8aef3b7cc0bcdee6cf838

    SHA256

    3b88ce177f7c1501a4303006ef4ef65bcf55a5a1207219d6dfc1713e71b65c73

    SHA512

    1ab69d5f0907313f2bbc8136e2df66089e5781a374fc34ccac9e99c2370f61a69251790178b6a2022c7e885bc0cf9ad7aadbc5060021ecd93d7719bb3247f6a2

  • C:\Users\Admin\daeki.exe

    Filesize

    200KB

    MD5

    c50dd73ae8b84624b0c3f48442a92103

    SHA1

    917d91b2126ec37fcfa8aef3b7cc0bcdee6cf838

    SHA256

    3b88ce177f7c1501a4303006ef4ef65bcf55a5a1207219d6dfc1713e71b65c73

    SHA512

    1ab69d5f0907313f2bbc8136e2df66089e5781a374fc34ccac9e99c2370f61a69251790178b6a2022c7e885bc0cf9ad7aadbc5060021ecd93d7719bb3247f6a2

  • memory/1612-132-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1612-141-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/3512-135-0x0000000000000000-mapping.dmp

  • memory/3512-140-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/3512-142-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB