Analysis

  • max time kernel
    151s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 23:04

General

  • Target

    822c70c38425452141fd3a14b605105be1612ff277b52184076acc3e117ee8a8.exe

  • Size

    140KB

  • MD5

    8b4ec8b641a0b30a7d4d75c7f7011cea

  • SHA1

    f7ace5b2d893db2629e7c6d589c1e3d681741c17

  • SHA256

    822c70c38425452141fd3a14b605105be1612ff277b52184076acc3e117ee8a8

  • SHA512

    a1b94f9ca218b848d7f776749e7374a03f0ef4d814f597fe92a4fd6befc9d98d41382173c828112864dec68da800158386618f1065dc45022428a4def829a31a

  • SSDEEP

    1536:0u0VT4pNyLV4Ji2+6wl4fAsyCsJ2AyJOSfNifNuzyWREQEFrsUhKeT4oQi9t:piCi2+6CXfCZAyJH1i1uzEQE5j4oQwt

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\822c70c38425452141fd3a14b605105be1612ff277b52184076acc3e117ee8a8.exe
    "C:\Users\Admin\AppData\Local\Temp\822c70c38425452141fd3a14b605105be1612ff277b52184076acc3e117ee8a8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\sbcuav.exe
      "C:\Users\Admin\sbcuav.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3136

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\sbcuav.exe

    Filesize

    140KB

    MD5

    9e5689656c5c3a9ee5451245d965be51

    SHA1

    2e61cb77b3bce1293ec27ac773969f2bc55e1c7b

    SHA256

    317edab8e990212e23fc7c59b33204d63aef47eb658d2e8b983d78531baca64c

    SHA512

    aae03bd9950d8c9701d73d2fc599c7ae117f8e2145d369b54ac267a14aa6a60a7f3c96a7d7a986010f6cf97d625c020e5c5e50d4634fc4cd32890e68a7f28b02

  • C:\Users\Admin\sbcuav.exe

    Filesize

    140KB

    MD5

    9e5689656c5c3a9ee5451245d965be51

    SHA1

    2e61cb77b3bce1293ec27ac773969f2bc55e1c7b

    SHA256

    317edab8e990212e23fc7c59b33204d63aef47eb658d2e8b983d78531baca64c

    SHA512

    aae03bd9950d8c9701d73d2fc599c7ae117f8e2145d369b54ac267a14aa6a60a7f3c96a7d7a986010f6cf97d625c020e5c5e50d4634fc4cd32890e68a7f28b02

  • memory/2732-132-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2732-135-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3136-141-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3136-142-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB