Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 11:21

General

  • Target

    a003edd1efbd12123c442709d954237eeb34e1a939f944f69efa7ee0e532f0a2.exe

  • Size

    148KB

  • MD5

    69863748c5cc26507cb2fe764009987d

  • SHA1

    9fad9dafa4403145ee710235f7fccaf42618da43

  • SHA256

    a003edd1efbd12123c442709d954237eeb34e1a939f944f69efa7ee0e532f0a2

  • SHA512

    149339c61c76199689b87a48a83f1e9f9f838b30ab8a1635a89375185b024542fc5dd0d1e8593150bff2a72727536fe26a9b7635a006dc82301578ca7545dfd6

  • SSDEEP

    3072:gdo+dgRs59j/pvkqBBac+RAGq1bg7Yfgst6OzOS79pgRZkhQJAOAoGE5j4oQe:OoCbj/pvkqBBac+RAGq1bZHtrzOS77kB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a003edd1efbd12123c442709d954237eeb34e1a939f944f69efa7ee0e532f0a2.exe
    "C:\Users\Admin\AppData\Local\Temp\a003edd1efbd12123c442709d954237eeb34e1a939f944f69efa7ee0e532f0a2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Users\Admin\suotuuh.exe
      "C:\Users\Admin\suotuuh.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\suotuuh.exe

    Filesize

    148KB

    MD5

    437a383cf07605d84e96f991db1b9f25

    SHA1

    9e61cc31723b20410c5102de578e71f9af5cc6c8

    SHA256

    5846e9fe3ac48fa02cf116e85aad95856860a265d0d1adb00aad9c2d19a6ef65

    SHA512

    a913acb4b257a068596eb08585df1029c93ada3e544aece20ed3297c16b360f23d3ae9e999d3245f92f8320b0cab4767a87484fd157a390cf8e4cf5bcb3a0d2d

  • C:\Users\Admin\suotuuh.exe

    Filesize

    148KB

    MD5

    437a383cf07605d84e96f991db1b9f25

    SHA1

    9e61cc31723b20410c5102de578e71f9af5cc6c8

    SHA256

    5846e9fe3ac48fa02cf116e85aad95856860a265d0d1adb00aad9c2d19a6ef65

    SHA512

    a913acb4b257a068596eb08585df1029c93ada3e544aece20ed3297c16b360f23d3ae9e999d3245f92f8320b0cab4767a87484fd157a390cf8e4cf5bcb3a0d2d