Analysis

  • max time kernel
    205s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:59

General

  • Target

    d2f3515366e9a981a7575e072a04743ad3e625ebfcb7955b48a4d0b0ab5d8e0a.exe

  • Size

    216KB

  • MD5

    4b9d8dd474bd40c7ee3090bb06311bb4

  • SHA1

    601e0aab0d604a0af7951c110d0e50a926c1d3e4

  • SHA256

    d2f3515366e9a981a7575e072a04743ad3e625ebfcb7955b48a4d0b0ab5d8e0a

  • SHA512

    a75ffcc5f142e87d49f0cf5881c7edaced36064853bfd21b9eab8f800dd95227c472f4639392e74161ebb30563d2606f31d36f87687e44784ad43ff3f13da6e5

  • SSDEEP

    3072:Z4Ozy5gnBOdmLGeCfcpwA5f3CEoEtUMbfM:COzfOK7cKiED5

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2f3515366e9a981a7575e072a04743ad3e625ebfcb7955b48a4d0b0ab5d8e0a.exe
    "C:\Users\Admin\AppData\Local\Temp\d2f3515366e9a981a7575e072a04743ad3e625ebfcb7955b48a4d0b0ab5d8e0a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:488
    • C:\Users\Admin\kmron.exe
      "C:\Users\Admin\kmron.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kmron.exe

    Filesize

    216KB

    MD5

    d3c60aabb944159873e9fb9b55de2e1c

    SHA1

    13fd7ed611d49a5f1052360f01bf5eaeebdfea3e

    SHA256

    632e45be7fb9bddf3d183084979e7adb8d202a3cb09325b40da619acaaf6d608

    SHA512

    068b06f4c523b3b1eb794f8ae158dac92c967359186d97658b761ba17afad3d5d2b9748ba3318399caafb59d52b13d9238215d2d79a5829eb94db6e4810b542a

  • C:\Users\Admin\kmron.exe

    Filesize

    216KB

    MD5

    d3c60aabb944159873e9fb9b55de2e1c

    SHA1

    13fd7ed611d49a5f1052360f01bf5eaeebdfea3e

    SHA256

    632e45be7fb9bddf3d183084979e7adb8d202a3cb09325b40da619acaaf6d608

    SHA512

    068b06f4c523b3b1eb794f8ae158dac92c967359186d97658b761ba17afad3d5d2b9748ba3318399caafb59d52b13d9238215d2d79a5829eb94db6e4810b542a