Analysis

  • max time kernel
    173s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 20:04

General

  • Target

    cfea0b3ffff41ce93372821b024fb795adfdb575d51be120556c83f8cbe76960.exe

  • Size

    176KB

  • MD5

    234a315643b5fb3005912691e431bcf5

  • SHA1

    34b4409dd51edcac738d7782890deb90b8946f02

  • SHA256

    cfea0b3ffff41ce93372821b024fb795adfdb575d51be120556c83f8cbe76960

  • SHA512

    5ab582ef5f67ac66052e2728d34b49f7fe369c2d5499aa8f7f2e08a3a6ac085c2e0e6db918d0e51b315a6297582022b7f62098b54aa66600ff111bb4c29affaa

  • SSDEEP

    3072:SC1b8Wlh4GWtPuCaAYmG5bcFuKnvmb7/D26inavm4QLzHpXP6D8R8FOjcKvDHmBD:ZB8WAGWtPuCaVmG5bnKnvmb7/D26caec

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 48 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfea0b3ffff41ce93372821b024fb795adfdb575d51be120556c83f8cbe76960.exe
    "C:\Users\Admin\AppData\Local\Temp\cfea0b3ffff41ce93372821b024fb795adfdb575d51be120556c83f8cbe76960.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\xhmeoq.exe
      "C:\Users\Admin\xhmeoq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3592

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xhmeoq.exe

    Filesize

    176KB

    MD5

    e756076a1e39dd89386419f43e5c7615

    SHA1

    fb9f2f1d93f8e6291ffcd4269548aa1ee34dd947

    SHA256

    4991236148a67aa6c741784cab3e86b578667e7cabc2cd5323ea380b6c127610

    SHA512

    37a2c657dcd1a45753fc302c9157e4cc6f0aecc3dcebf6979b7aa10ce497b00732c940fd4af5067843d0c7a986e2f64db4aee35ce6c38e073cff5c56aab3b1e1

  • C:\Users\Admin\xhmeoq.exe

    Filesize

    176KB

    MD5

    e756076a1e39dd89386419f43e5c7615

    SHA1

    fb9f2f1d93f8e6291ffcd4269548aa1ee34dd947

    SHA256

    4991236148a67aa6c741784cab3e86b578667e7cabc2cd5323ea380b6c127610

    SHA512

    37a2c657dcd1a45753fc302c9157e4cc6f0aecc3dcebf6979b7aa10ce497b00732c940fd4af5067843d0c7a986e2f64db4aee35ce6c38e073cff5c56aab3b1e1

  • memory/3592-134-0x0000000000000000-mapping.dmp