Analysis

  • max time kernel
    155s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:45

General

  • Target

    4999bd7f79df266ab6902df1a4e092fb5681f907647f8c8637f22c0575eb721a.exe

  • Size

    412KB

  • MD5

    e16a529917406d7a6cad51ba9500a3d0

  • SHA1

    bd85a4bb14d3da60f6ae622458a02ef6fa61f5ba

  • SHA256

    4999bd7f79df266ab6902df1a4e092fb5681f907647f8c8637f22c0575eb721a

  • SHA512

    cf27b851e492644974570ded860ea0de0dd05c95493a1b8dff2ea86f9226561f9499ab43949712dbc354b07bcea587af7a899cc6ad6865dbffde69d998040591

  • SSDEEP

    12288:CmTHB+UDBdIA6h/Tz7+nLyB/sZKfLscbvkivkCwJ3H:CVP/sWL2

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 58 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4999bd7f79df266ab6902df1a4e092fb5681f907647f8c8637f22c0575eb721a.exe
    "C:\Users\Admin\AppData\Local\Temp\4999bd7f79df266ab6902df1a4e092fb5681f907647f8c8637f22c0575eb721a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\liiunuy.exe
      "C:\Users\Admin\liiunuy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4056

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\liiunuy.exe

          Filesize

          412KB

          MD5

          3ecef883791e480f4cd48816dba70979

          SHA1

          a51eccceecb413cf4bb019702b57a102f8715815

          SHA256

          01d2c5cdd363339f1278c347ea6b08b7f33774db1f95f43affdbec38dfa35323

          SHA512

          2593a4f3292e528bed5b27b76196df0ae6707eb6d981d3363a0e479671694cf5212b22c098176faaf9e6e3bee0fbc6879d4aa7265b80c9eff3aeedef3509d706

        • C:\Users\Admin\liiunuy.exe

          Filesize

          412KB

          MD5

          3ecef883791e480f4cd48816dba70979

          SHA1

          a51eccceecb413cf4bb019702b57a102f8715815

          SHA256

          01d2c5cdd363339f1278c347ea6b08b7f33774db1f95f43affdbec38dfa35323

          SHA512

          2593a4f3292e528bed5b27b76196df0ae6707eb6d981d3363a0e479671694cf5212b22c098176faaf9e6e3bee0fbc6879d4aa7265b80c9eff3aeedef3509d706

        • memory/4056-140-0x0000000000400000-0x0000000000469000-memory.dmp

          Filesize

          420KB

        • memory/4056-142-0x0000000000400000-0x0000000000469000-memory.dmp

          Filesize

          420KB

        • memory/4212-132-0x0000000000400000-0x0000000000469000-memory.dmp

          Filesize

          420KB

        • memory/4212-141-0x0000000000400000-0x0000000000469000-memory.dmp

          Filesize

          420KB