Analysis

  • max time kernel
    181s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 23:22

General

  • Target

    f51caccf571e9ecf6d1cb95ddf5b22413a366178b6b82f33952cf24d050abb3c.exe

  • Size

    168KB

  • MD5

    06315c4d32c4886491208150502a1cbf

  • SHA1

    acd7458d4da4bf391916b4a376c289c2b46eab67

  • SHA256

    f51caccf571e9ecf6d1cb95ddf5b22413a366178b6b82f33952cf24d050abb3c

  • SHA512

    571705625be0cf2bca5433e10d3743baa06ba5c3f07b817926517d9c135ee94885b0c34382b4bccee7413cf93eb9f1ab6a58984c36016d468db32e4766233a99

  • SSDEEP

    1536:l2tYrq10bcwzrq7FBaKH67bU8TkWRifJYwdtmP+7m5KFbwQ44AW3lV4cEUl0OEZ+:Gu1zrSFBTZCchor5KFjvFP5YCkfJnnDI

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f51caccf571e9ecf6d1cb95ddf5b22413a366178b6b82f33952cf24d050abb3c.exe
    "C:\Users\Admin\AppData\Local\Temp\f51caccf571e9ecf6d1cb95ddf5b22413a366178b6b82f33952cf24d050abb3c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\hckiug.exe
      "C:\Users\Admin\hckiug.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2876

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\hckiug.exe

          Filesize

          168KB

          MD5

          ef70794c494b712a01dbbf42b8c6bf02

          SHA1

          b875d72272d73ef4ef939519a0c174e594fb1bbe

          SHA256

          9846e1b40d74cef5db653e1faf00cf5d641b011584797422a9fd326d5577ef55

          SHA512

          87795ea7461d8ccd8fa7c2422c253004513209ce19870f5cd5553c1025d293eac4b0258dc25f63dea0910188e12967aae2bf0afb16bd521d44875e95d73760a9

        • C:\Users\Admin\hckiug.exe

          Filesize

          168KB

          MD5

          ef70794c494b712a01dbbf42b8c6bf02

          SHA1

          b875d72272d73ef4ef939519a0c174e594fb1bbe

          SHA256

          9846e1b40d74cef5db653e1faf00cf5d641b011584797422a9fd326d5577ef55

          SHA512

          87795ea7461d8ccd8fa7c2422c253004513209ce19870f5cd5553c1025d293eac4b0258dc25f63dea0910188e12967aae2bf0afb16bd521d44875e95d73760a9