Analysis

  • max time kernel
    156s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:46

General

  • Target

    510840e78fb89dd6aa15b07bfdd1b98fd749ecc02c043ec10130a63922ac1a60.exe

  • Size

    260KB

  • MD5

    3f47a0d754dbe6fffdbdc1577b0f7f9b

  • SHA1

    d5cd1d082b02997052094d661d9cf3b6166df99a

  • SHA256

    510840e78fb89dd6aa15b07bfdd1b98fd749ecc02c043ec10130a63922ac1a60

  • SHA512

    c6fe74b7b13164a77633ab3247f7b92ab4e8cc98bd07b215cc036a0bfb134a781b8396e730a6d282d40cb2242758096a27f12a5dc98aa695ba1f8d83f991d024

  • SSDEEP

    3072:ZgfAlN2kAvh25n/kZoSUjMqXnpWAkpAmTSrMaIOYt/jo7LAtPhjjtZnfHFEoWBfE:ZdvgTSrMaIl/jcLijfHFEHWzXvjT85R

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\510840e78fb89dd6aa15b07bfdd1b98fd749ecc02c043ec10130a63922ac1a60.exe
    "C:\Users\Admin\AppData\Local\Temp\510840e78fb89dd6aa15b07bfdd1b98fd749ecc02c043ec10130a63922ac1a60.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Users\Admin\toezuob.exe
      "C:\Users\Admin\toezuob.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\toezuob.exe

    Filesize

    260KB

    MD5

    83ed50124b6b29f5a0bd07fefe6bde5a

    SHA1

    26ce3b93b5351516582cc196ff3f7be45ddd0961

    SHA256

    b53c7f011bbd072179c065b3602f7fb63ba54b93d07a9b6c19a61715e253d10b

    SHA512

    adccd438b08b4362d149e90771dc2dc83b88f2f1f52c13d9afa239b905ec437bc3ea4121f027c59fa48ecfc22007c1d3e29a643d88effda383ee87c322b1b117

  • C:\Users\Admin\toezuob.exe

    Filesize

    260KB

    MD5

    83ed50124b6b29f5a0bd07fefe6bde5a

    SHA1

    26ce3b93b5351516582cc196ff3f7be45ddd0961

    SHA256

    b53c7f011bbd072179c065b3602f7fb63ba54b93d07a9b6c19a61715e253d10b

    SHA512

    adccd438b08b4362d149e90771dc2dc83b88f2f1f52c13d9afa239b905ec437bc3ea4121f027c59fa48ecfc22007c1d3e29a643d88effda383ee87c322b1b117