Analysis

  • max time kernel
    266s
  • max time network
    265s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 22:51

General

  • Target

    b7f82e67c015e29b12493825be8dacf1f8b0c628edbf23a0a636a545e758b2d9.exe

  • Size

    212KB

  • MD5

    0f891219f7d89012a9c88d843c18bd30

  • SHA1

    4e81f4eaee312346d76ce67ee57e768b14fd4e67

  • SHA256

    b7f82e67c015e29b12493825be8dacf1f8b0c628edbf23a0a636a545e758b2d9

  • SHA512

    626f0d8d43804123f4df5c13118357478fc49704394c2877633029403a326f6a4fea016234029ef2f3d4b5fca1003dad95c357314bcb7aeb93589a91bf08b094

  • SSDEEP

    3072:tVbPD2g8h7kv+EbncAXp4wiY3fXfLqus2RrMh9VsgV2Ksb+ET8/3TYhPR+fA4eQf:987kvHtdysb+duWMs

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7f82e67c015e29b12493825be8dacf1f8b0c628edbf23a0a636a545e758b2d9.exe
    "C:\Users\Admin\AppData\Local\Temp\b7f82e67c015e29b12493825be8dacf1f8b0c628edbf23a0a636a545e758b2d9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Users\Admin\tieloa.exe
      "C:\Users\Admin\tieloa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tieloa.exe

    Filesize

    212KB

    MD5

    706be66b233e5c32665d28ecb9f079be

    SHA1

    b32265c5ab4c82b89b31888525ce5bd95fe48c46

    SHA256

    e9a65499121b1caaaf461280f8cf1574bdbcf40f1f24c980e75e031f44b84bcb

    SHA512

    f5acaff90440368c77167cd74e11ae0d3e4b0768bfab9f6a5c7f0c4e62e638e0ea5c5ef9406ca2286e5d629b43f4cc157920fafd42357c76131ed2100d8ed1d4

  • C:\Users\Admin\tieloa.exe

    Filesize

    212KB

    MD5

    706be66b233e5c32665d28ecb9f079be

    SHA1

    b32265c5ab4c82b89b31888525ce5bd95fe48c46

    SHA256

    e9a65499121b1caaaf461280f8cf1574bdbcf40f1f24c980e75e031f44b84bcb

    SHA512

    f5acaff90440368c77167cd74e11ae0d3e4b0768bfab9f6a5c7f0c4e62e638e0ea5c5ef9406ca2286e5d629b43f4cc157920fafd42357c76131ed2100d8ed1d4