Analysis

  • max time kernel
    155s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 23:31

General

  • Target

    987d7eeef959a014309ecd9494d67840f6e3b301ee0c4997c911bf3443c64a5a.exe

  • Size

    152KB

  • MD5

    0d3ca9536c41e3d337bcc617eea01184

  • SHA1

    9d7d8716e665fd5c1b92656207118ea078aac4ea

  • SHA256

    987d7eeef959a014309ecd9494d67840f6e3b301ee0c4997c911bf3443c64a5a

  • SHA512

    34334825a02db3ec8b4d7d894d0a3186882894c1c59f8a54e6b5f7db8722fbd98dd14cc4c7b7cd3f9620f49caa9ddb6d8b0b7af522cb0ca49d208bd971f6ec37

  • SSDEEP

    3072:ijjxyTX5TASCDGZRImwnpDT/B660vYSrwCLzsN01jsvmusvT:iATqSREnpDT/M60vYSrwCLLsvs

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\987d7eeef959a014309ecd9494d67840f6e3b301ee0c4997c911bf3443c64a5a.exe
    "C:\Users\Admin\AppData\Local\Temp\987d7eeef959a014309ecd9494d67840f6e3b301ee0c4997c911bf3443c64a5a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Users\Admin\buaaje.exe
      "C:\Users\Admin\buaaje.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\buaaje.exe

    Filesize

    152KB

    MD5

    358f5ddaffbb6fa2f080fd56803a7c29

    SHA1

    a35dff44f3b6618aceca4dda321cb33daa1aaf11

    SHA256

    9c224d9c6ddd81be104b4694bf5eeffd58a6e00e6b5482ef7bbfe2a67e77c0ef

    SHA512

    797893d37a60ffc2661e11bed907a57f91a27fdbe7effddfd02671879db6db1f96213d76bef1d1fa4febe281d1f83cdb8c160422c0062afc49ac8e36cfb3cb08

  • C:\Users\Admin\buaaje.exe

    Filesize

    152KB

    MD5

    358f5ddaffbb6fa2f080fd56803a7c29

    SHA1

    a35dff44f3b6618aceca4dda321cb33daa1aaf11

    SHA256

    9c224d9c6ddd81be104b4694bf5eeffd58a6e00e6b5482ef7bbfe2a67e77c0ef

    SHA512

    797893d37a60ffc2661e11bed907a57f91a27fdbe7effddfd02671879db6db1f96213d76bef1d1fa4febe281d1f83cdb8c160422c0062afc49ac8e36cfb3cb08