Analysis

  • max time kernel
    238s
  • max time network
    245s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 20:01

General

  • Target

    2409661b45debbd4bf9b427174ee3f5a552212bf851e1d182ed91a31f390ed5e.exe

  • Size

    176KB

  • MD5

    edbc251b7c4470d35892371895968150

  • SHA1

    59438e8d846dbf10f46fda600dec9f1423937c0c

  • SHA256

    2409661b45debbd4bf9b427174ee3f5a552212bf851e1d182ed91a31f390ed5e

  • SHA512

    3d1c40df1b20f173c5f4542ad6ec9943effad3dbf30197c6f34bce836428c649cd7864adbc92ecabf5500b13effd2d876aa4ce45c3bd71f31e33d931d2e9ca3b

  • SSDEEP

    3072:dI04IcfpHlp1D2KcwjIU2aTObcpT/pHkEAbN/yK/fObT/bGiCV/COqoSQ1iBuAZj:S04PfpHlp1KKcwjIDaTObcZ/pHkMK/fg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2409661b45debbd4bf9b427174ee3f5a552212bf851e1d182ed91a31f390ed5e.exe
    "C:\Users\Admin\AppData\Local\Temp\2409661b45debbd4bf9b427174ee3f5a552212bf851e1d182ed91a31f390ed5e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Users\Admin\caivoul.exe
      "C:\Users\Admin\caivoul.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\caivoul.exe

    Filesize

    176KB

    MD5

    9b6830653c9ace6c9afeb2d2efda3135

    SHA1

    4a74526aba3f5cdf2a9cc9e1b0018db60a30a431

    SHA256

    4d5de0beacd1c64dda87de0d9a52a411fd05ad859d0f4cefcd75637da21d8495

    SHA512

    c6762b598ef16388194370287abbc1515ce1041be64db7217d8317e16506f7048b501fb92c3a112687196d96ca781756d14a58533cdb37f0ca5e5d6b977e516c

  • C:\Users\Admin\caivoul.exe

    Filesize

    176KB

    MD5

    9b6830653c9ace6c9afeb2d2efda3135

    SHA1

    4a74526aba3f5cdf2a9cc9e1b0018db60a30a431

    SHA256

    4d5de0beacd1c64dda87de0d9a52a411fd05ad859d0f4cefcd75637da21d8495

    SHA512

    c6762b598ef16388194370287abbc1515ce1041be64db7217d8317e16506f7048b501fb92c3a112687196d96ca781756d14a58533cdb37f0ca5e5d6b977e516c

  • memory/3432-134-0x0000000000000000-mapping.dmp