Analysis

  • max time kernel
    154s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 22:39

General

  • Target

    eaa10501396d8ee9dabd57eec08e00221a100041ee3c52d52b7525c6248ec243.exe

  • Size

    88KB

  • MD5

    ae97ca810fbcbb0f17922030800d88d5

  • SHA1

    6bb84c68909a0945f78c55d5e86d03f7bb66f3cf

  • SHA256

    eaa10501396d8ee9dabd57eec08e00221a100041ee3c52d52b7525c6248ec243

  • SHA512

    3581b09221017e6cb8c8a27dc9027698704f37516c602e0d978a76a742a7e1736742ee06b099d7a91216a40f79209ea2e0451d05bcb9081589013206a3ae83b5

  • SSDEEP

    768:fDFIjMAddaqnObOasGEwU8Z1Rbe2kjEQJQ1H7a8zFkzqcw+So5mN:JII9iCU8Z1QjEQJecw+B5

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaa10501396d8ee9dabd57eec08e00221a100041ee3c52d52b7525c6248ec243.exe
    "C:\Users\Admin\AppData\Local\Temp\eaa10501396d8ee9dabd57eec08e00221a100041ee3c52d52b7525c6248ec243.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3348
    • C:\Users\Admin\liuiri.exe
      "C:\Users\Admin\liuiri.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\liuiri.exe

    Filesize

    88KB

    MD5

    366345176445f73e59403f5d4e8d3bed

    SHA1

    5b781221a96b56e38516b855a7cd8e5c6afb7c1e

    SHA256

    c7b54151fde28ca7f91267987aedb72b67d4153698d7182f9096802a737347ca

    SHA512

    7ef83866ec6c0436b618ed6effe7a2ba664df95a7046b2ff9ec74d3396adff09fe1e4d6efdb42c3f0e6c84e6f915ed8b9ed3464c365d902fc4b80ff8683b42a2

  • C:\Users\Admin\liuiri.exe

    Filesize

    88KB

    MD5

    366345176445f73e59403f5d4e8d3bed

    SHA1

    5b781221a96b56e38516b855a7cd8e5c6afb7c1e

    SHA256

    c7b54151fde28ca7f91267987aedb72b67d4153698d7182f9096802a737347ca

    SHA512

    7ef83866ec6c0436b618ed6effe7a2ba664df95a7046b2ff9ec74d3396adff09fe1e4d6efdb42c3f0e6c84e6f915ed8b9ed3464c365d902fc4b80ff8683b42a2

  • memory/4912-134-0x0000000000000000-mapping.dmp