Analysis

  • max time kernel
    170s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 09:51

General

  • Target

    9b5b4ff02d4967dff2b4b5350490966ce6cfd9c038725b295e4c7b7b7f81944e.exe

  • Size

    192KB

  • MD5

    4e75216153540c1935964fc0c95b8d9e

  • SHA1

    059caa0ce5a239718055a767a6fbdc2c6e9ca982

  • SHA256

    9b5b4ff02d4967dff2b4b5350490966ce6cfd9c038725b295e4c7b7b7f81944e

  • SHA512

    f28fbdc858c366ca104f27326a2b4dc277ce5bf79177956f94cfab3d9f888e9cd152901735b2ccb082f19c09fd999c4251925e15485aee9aaddfe2851c583036

  • SSDEEP

    3072:wu8+OE1OBrpM3lt0bqO4deKIpS2Q9tC3UwtxaTSGzGXDzp8D8OJbhaDFe3oTK:/OBr63cbqO40K394aTSGzGZ8ogpYG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b5b4ff02d4967dff2b4b5350490966ce6cfd9c038725b295e4c7b7b7f81944e.exe
    "C:\Users\Admin\AppData\Local\Temp\9b5b4ff02d4967dff2b4b5350490966ce6cfd9c038725b295e4c7b7b7f81944e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\foone.exe
      "C:\Users\Admin\foone.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:308

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\foone.exe

    Filesize

    192KB

    MD5

    32a348c541c32674d3bd0b2388b6c678

    SHA1

    e4522908a74a009b35b1790d6bb0c06bd81863ba

    SHA256

    6b2ab0260807ada17bf51a9186be9aecf3dfa692bcb297542c0c647f98cb49d4

    SHA512

    5146aa3e5d9f42f35506269734f34e2434bba2d45e3a804f316a5187b1f6198517d9eb7959af528d8161edfb49c7d088709bcc65b67d9b70dbdd6e6e20eb8f0e

  • C:\Users\Admin\foone.exe

    Filesize

    192KB

    MD5

    32a348c541c32674d3bd0b2388b6c678

    SHA1

    e4522908a74a009b35b1790d6bb0c06bd81863ba

    SHA256

    6b2ab0260807ada17bf51a9186be9aecf3dfa692bcb297542c0c647f98cb49d4

    SHA512

    5146aa3e5d9f42f35506269734f34e2434bba2d45e3a804f316a5187b1f6198517d9eb7959af528d8161edfb49c7d088709bcc65b67d9b70dbdd6e6e20eb8f0e