Analysis

  • max time kernel
    201s
  • max time network
    230s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 23:07

General

  • Target

    59b970eb8282ac725e61decffdde56e42d74a7d325e56b07a8dd32b6959091cb.exe

  • Size

    296KB

  • MD5

    09b14808bc572a0560c7d0c67971d330

  • SHA1

    c6f347aee9831a2642d9bb26e7b721ac90cd0898

  • SHA256

    59b970eb8282ac725e61decffdde56e42d74a7d325e56b07a8dd32b6959091cb

  • SHA512

    0c4f04554810f7bf4e3c13245c0cf199d0a83920d1dfa3f2cef5bb8323bbe04521a2140c683399d9c6181b5fc0cadd5913e23b4abc72f1039ab32cbc7f98da5f

  • SSDEEP

    3072:ccDq2q+sg+swlSN9BkPFzW85u9ututumuOu+uxuOugujuju9u9ugu9uPuTu6utus:caq+sg+s

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59b970eb8282ac725e61decffdde56e42d74a7d325e56b07a8dd32b6959091cb.exe
    "C:\Users\Admin\AppData\Local\Temp\59b970eb8282ac725e61decffdde56e42d74a7d325e56b07a8dd32b6959091cb.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Users\Admin\feumiu.exe
      "C:\Users\Admin\feumiu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3456

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\feumiu.exe

          Filesize

          296KB

          MD5

          bcff906984e4447666ed97755e0ed485

          SHA1

          5bf254ac3d7583c33f2e73a2c3071789555abe11

          SHA256

          b46920d0de4abf29759276564da1eb99a020cb4ca1a5479c47c647dde84ff6ef

          SHA512

          9d1754bdc7b91b96d3e1c0fb4c18eaa16a68f76a23b003c4d160d1e04ca79c5ea5cbede44978063a17064f7c7f70ce749b89d836fd91cfa9b43b8ea8a6806f68

        • C:\Users\Admin\feumiu.exe

          Filesize

          296KB

          MD5

          bcff906984e4447666ed97755e0ed485

          SHA1

          5bf254ac3d7583c33f2e73a2c3071789555abe11

          SHA256

          b46920d0de4abf29759276564da1eb99a020cb4ca1a5479c47c647dde84ff6ef

          SHA512

          9d1754bdc7b91b96d3e1c0fb4c18eaa16a68f76a23b003c4d160d1e04ca79c5ea5cbede44978063a17064f7c7f70ce749b89d836fd91cfa9b43b8ea8a6806f68