Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:41

General

  • Target

    6352f4463c3fc42a32bbe6758b2b272fad99f1d979cd3742526e47b3d729f61f.exe

  • Size

    140KB

  • MD5

    0fe38a686e9d02a5fe8e613b063ef590

  • SHA1

    a010a83419f0e43eb292f679710f5db5c872c1c0

  • SHA256

    6352f4463c3fc42a32bbe6758b2b272fad99f1d979cd3742526e47b3d729f61f

  • SHA512

    3865866b615c0f18a36a662823ad22eb1dff70b06505dc646e3e77e930294f4057726a1013ffeb728be93f4bc6dfadd84fd724e2be69e96a93e27faadfdb0402

  • SSDEEP

    3072:QBq7clSAY5uXq0cu3XMO4nZLJY0PoeU60ohKdlLWO7:QBqtAY5uXq0cu3XMO4nZLJPot60ohKdR

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6352f4463c3fc42a32bbe6758b2b272fad99f1d979cd3742526e47b3d729f61f.exe
    "C:\Users\Admin\AppData\Local\Temp\6352f4463c3fc42a32bbe6758b2b272fad99f1d979cd3742526e47b3d729f61f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Users\Admin\ciialu.exe
      "C:\Users\Admin\ciialu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4300

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\ciialu.exe

          Filesize

          140KB

          MD5

          7cc06d68e1221374f5bf607ac0a8f827

          SHA1

          efc8ab24b6b85cdd47ef06c6aabcd374f04e5e8d

          SHA256

          fd3b960822f0115cc24c4b592bb73c9b94f4a084efddc2eb2b38a9d276009412

          SHA512

          2ccde842e6b0217b20472c7ee63abb60c7b2f59e79000e80e17f8e7221ade3b15821c72f647f12e8270367711a13e7c4973572dd088c7a8f222b736cae6fa92a

        • C:\Users\Admin\ciialu.exe

          Filesize

          140KB

          MD5

          7cc06d68e1221374f5bf607ac0a8f827

          SHA1

          efc8ab24b6b85cdd47ef06c6aabcd374f04e5e8d

          SHA256

          fd3b960822f0115cc24c4b592bb73c9b94f4a084efddc2eb2b38a9d276009412

          SHA512

          2ccde842e6b0217b20472c7ee63abb60c7b2f59e79000e80e17f8e7221ade3b15821c72f647f12e8270367711a13e7c4973572dd088c7a8f222b736cae6fa92a

        • memory/4300-140-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/4300-141-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/4812-132-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB