Analysis

  • max time kernel
    152s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 11:36

General

  • Target

    0f85984254be4c9a63d196eec379c6ffa64499c407fdd3978f931d9fbe0930d0.exe

  • Size

    304KB

  • MD5

    f95cf9af8fd14f79a920bccc19d696ba

  • SHA1

    8d9634d7b6e93e0dd0767d6523d8aa4ee2def74c

  • SHA256

    0f85984254be4c9a63d196eec379c6ffa64499c407fdd3978f931d9fbe0930d0

  • SHA512

    668d6983e202108576a7d45be8ac0be7f390bf7289ba01f46d2b7412c27a66acfe0e3e4dd83cf7a702e52d7c6acc3b78cd2e423f7877435c145a010d1dad71fd

  • SSDEEP

    3072:iRf1i2Dwhe6YIRnbXtcU75FzKqc+HTi1op2aEaDFHT+7pvPxvQTo:tx9oYixla8xN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f85984254be4c9a63d196eec379c6ffa64499c407fdd3978f931d9fbe0930d0.exe
    "C:\Users\Admin\AppData\Local\Temp\0f85984254be4c9a63d196eec379c6ffa64499c407fdd3978f931d9fbe0930d0.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3400
    • C:\Users\Admin\viopoa.exe
      "C:\Users\Admin\viopoa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\viopoa.exe

    Filesize

    304KB

    MD5

    77fdac305009683a714e03f4832739fd

    SHA1

    fb58cd39493646eb1d56ca035abecc3ff4830a50

    SHA256

    9c33eba887186e0a0ba62d0fac9f33175099d6756c0fdf58d74d9f18d8982fc9

    SHA512

    60cc3cf95731ee44cc2fd18229c321aed3e89de0b2af634752d494c6b701bd86a0d401665f307e0aea2babb622a6ce33020efaa0940cb285b25b3d5c263fc826

  • C:\Users\Admin\viopoa.exe

    Filesize

    304KB

    MD5

    77fdac305009683a714e03f4832739fd

    SHA1

    fb58cd39493646eb1d56ca035abecc3ff4830a50

    SHA256

    9c33eba887186e0a0ba62d0fac9f33175099d6756c0fdf58d74d9f18d8982fc9

    SHA512

    60cc3cf95731ee44cc2fd18229c321aed3e89de0b2af634752d494c6b701bd86a0d401665f307e0aea2babb622a6ce33020efaa0940cb285b25b3d5c263fc826

  • memory/3400-134-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3400-141-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4324-140-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4324-142-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB