Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 07:25

General

  • Target

    54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe

  • Size

    212KB

  • MD5

    3e1ddce5de2382ada2af8964a99bd58f

  • SHA1

    e528ea8594bcae16325cfbf8897dc009ab2a38d7

  • SHA256

    54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625

  • SHA512

    18c7ca1337e00c05e137b600db84c527537ee6cae524b66a83ad0fe26dba43039419cfd0d74facb3cfca85a0a73613c74f3a3ede835b8e4725ce80393d63588c

  • SSDEEP

    6144:i9AKwwPYiczY09umHh7K5cUXEBwrYVHhAgY65cJ:OAbyYxY09umH45cUXEBwUVHhAgY65u

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 58 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe
    "C:\Users\Admin\AppData\Local\Temp\54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Users\Admin\roosiah.exe
      "C:\Users\Admin\roosiah.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:3188

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\roosiah.exe

    Filesize

    212KB

    MD5

    48700dd2a328aeb33c9ea2317592054f

    SHA1

    7389b16aa1473c2313cb40a7b0b1b99df452ca17

    SHA256

    7e22a4ddc716450399ed012bcfe033221ccdb3f4b1f3bcc7dd5cd5cf3a6fec71

    SHA512

    95827f8c606d6fe20e76f42198e52cf73d34e2d470e29e18b0b4a774f983ac93309a9ce2c4f83b4d41608e722fd16ff5e7a724d8b2ef084998e692e79b282b3a

  • C:\Users\Admin\roosiah.exe

    Filesize

    212KB

    MD5

    48700dd2a328aeb33c9ea2317592054f

    SHA1

    7389b16aa1473c2313cb40a7b0b1b99df452ca17

    SHA256

    7e22a4ddc716450399ed012bcfe033221ccdb3f4b1f3bcc7dd5cd5cf3a6fec71

    SHA512

    95827f8c606d6fe20e76f42198e52cf73d34e2d470e29e18b0b4a774f983ac93309a9ce2c4f83b4d41608e722fd16ff5e7a724d8b2ef084998e692e79b282b3a