Analysis

  • max time kernel
    155s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 20:11

General

  • Target

    a434b67a0cb59981ae6506b31b54a5da7a19cc0425844151ad639b82a1fe3478.exe

  • Size

    132KB

  • MD5

    80e8c5f1d4a4e6afb0868980bf56e8c7

  • SHA1

    f1db201ae863dd7933943ad22a174f0d9057a6bb

  • SHA256

    a434b67a0cb59981ae6506b31b54a5da7a19cc0425844151ad639b82a1fe3478

  • SHA512

    feb4d77b288a0e6dae93f2959de75afb2844d0ea589badfd581e2fb9737b1d63dac9fa8ef066578ddce11889280eef4dabeef1f9c7f7e93a768d94580ccfb175

  • SSDEEP

    1536:qDyYyucfQpfEZYbvCPl+ogEQNkq0ZhEK4YWQb8wVHGN7ZZ7OMiCXxv1oF6:qDyFfQlaYmPkogEZqPkbve7p986

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a434b67a0cb59981ae6506b31b54a5da7a19cc0425844151ad639b82a1fe3478.exe
    "C:\Users\Admin\AppData\Local\Temp\a434b67a0cb59981ae6506b31b54a5da7a19cc0425844151ad639b82a1fe3478.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Users\Admin\waoqao.exe
      "C:\Users\Admin\waoqao.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\waoqao.exe

    Filesize

    132KB

    MD5

    18d3de4f3c365f653eff5b3168e0ba26

    SHA1

    791f29eb7aa7a17e9c363f1836356b9501a4cbae

    SHA256

    710f141ccb4d6a3734472ab787d8b2473fdaba6043885256de85a0a42a3a9f08

    SHA512

    92ee13ebc3337c2794b00c16edd04fdc99d492f5c1710b5a69c58c69ec139c18638914ebb72e4ca768d1fc489feb8e924d63a4653efbc353e330bafe7193c2ff

  • C:\Users\Admin\waoqao.exe

    Filesize

    132KB

    MD5

    18d3de4f3c365f653eff5b3168e0ba26

    SHA1

    791f29eb7aa7a17e9c363f1836356b9501a4cbae

    SHA256

    710f141ccb4d6a3734472ab787d8b2473fdaba6043885256de85a0a42a3a9f08

    SHA512

    92ee13ebc3337c2794b00c16edd04fdc99d492f5c1710b5a69c58c69ec139c18638914ebb72e4ca768d1fc489feb8e924d63a4653efbc353e330bafe7193c2ff