Analysis

  • max time kernel
    155s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 23:22

General

  • Target

    033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe

  • Size

    260KB

  • MD5

    39d7570310dde337c4e7138395c0d262

  • SHA1

    124e3a5c1626e110c7e7a491fb93722d43689fd7

  • SHA256

    033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0

  • SHA512

    7a7c7019a724d1aff0cfa20f1e638c7587ea57ecd40c70b5f450a9b39295ced76e4d9a2ce79bc2a50ea72d630660546013c50f93baea5ddb0d9b8c3906ca09ff

  • SSDEEP

    3072:ygfAlNtvh25n/kZoSUjMqXnpWAkpAmTSrMaIOYt/jo7LAtPhjjtZnfHFEoWBfGVR:ydYgTSrMaIl/jcLijfHFEHWzXvjT85R

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe
    "C:\Users\Admin\AppData\Local\Temp\033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Users\Admin\mwdep.exe
      "C:\Users\Admin\mwdep.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\mwdep.exe

    Filesize

    260KB

    MD5

    cc783733b9274dd666c42476eeb29d96

    SHA1

    d13f8ccf4d89b952c25fe61c5b79bda443c64f93

    SHA256

    97c8055295db00158874d2db9ce68d70253d5f9f3916e52dc1ac1abf8f33b952

    SHA512

    8e0c9740613f4e624181972a07f9b56f62fa9503a36496c9f8e06b53cb645bd0a6c945329c91f6815e174604eb04ef30fa58b4b7fc312df43f1c80af2799acda

  • C:\Users\Admin\mwdep.exe

    Filesize

    260KB

    MD5

    cc783733b9274dd666c42476eeb29d96

    SHA1

    d13f8ccf4d89b952c25fe61c5b79bda443c64f93

    SHA256

    97c8055295db00158874d2db9ce68d70253d5f9f3916e52dc1ac1abf8f33b952

    SHA512

    8e0c9740613f4e624181972a07f9b56f62fa9503a36496c9f8e06b53cb645bd0a6c945329c91f6815e174604eb04ef30fa58b4b7fc312df43f1c80af2799acda