Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 11:36

General

  • Target

    eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe

  • Size

    304KB

  • MD5

    1bddeda269cb7cb5b41b6e497757ded0

  • SHA1

    12841ce1bcaadb6a7786a07ee54ba9c328512d9f

  • SHA256

    eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e

  • SHA512

    5b1718b0e93edad8c7ee201b53331dc75819bf24f7982c935d3aa17923338dee29e13a51b49fd15f5d57b1af5ad52245a303b2514382126488434846a4ca6742

  • SSDEEP

    3072:GPGOaEaAaTG0kZSmA2Spxqc+2IMop2aEaLFra+7pvPSvzhy:b4ApDJIylaRSg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe
    "C:\Users\Admin\AppData\Local\Temp\eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\roeriul.exe
      "C:\Users\Admin\roeriul.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\roeriul.exe

    Filesize

    304KB

    MD5

    655f86c6d614dc7d2589c5c472e10896

    SHA1

    63c68fe56603fe626489fb144327b371f31d3cb3

    SHA256

    1ec1c694434129e6651741cbaeb6f2e5d951a2a79fe4c79eff1eca33eefbfae6

    SHA512

    93e62ec50e965a650fa6392dd8d9b13a4c970fdbc3cc4bc358c427e0fcca4e180af815c923752ef64447c919d243def6582a0de2bd61a6811e889c4c06ab06cd

  • C:\Users\Admin\roeriul.exe

    Filesize

    304KB

    MD5

    655f86c6d614dc7d2589c5c472e10896

    SHA1

    63c68fe56603fe626489fb144327b371f31d3cb3

    SHA256

    1ec1c694434129e6651741cbaeb6f2e5d951a2a79fe4c79eff1eca33eefbfae6

    SHA512

    93e62ec50e965a650fa6392dd8d9b13a4c970fdbc3cc4bc358c427e0fcca4e180af815c923752ef64447c919d243def6582a0de2bd61a6811e889c4c06ab06cd

  • memory/2608-134-0x0000000000000000-mapping.dmp