Analysis

  • max time kernel
    188s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 23:39

General

  • Target

    c1d46fe7c274b8f2074cc08274070126b9e71f2a6d7d4739b522efaa4b84d391.exe

  • Size

    216KB

  • MD5

    9ca6fd69e0196ae2ca0b6a6c71cd7621

  • SHA1

    333e6f318153dd9fffa343c79038eaf0ff0748ff

  • SHA256

    c1d46fe7c274b8f2074cc08274070126b9e71f2a6d7d4739b522efaa4b84d391

  • SHA512

    e4bf3425a16172130d7568adb7fa8a7e67af74470204f4ab014d3139168ed1558515f60afc6a690844bd0c155eeb02e784955af169a7b603cd21ee11230da501

  • SSDEEP

    6144:32t1Ifrt3+TetonBi3QxRy4g09ICSnqf9uSUgkxtpsaPjK/bEoK828fwAoEn+MVz:32Ert3+TetonBi3QxRwfnqf9uSUgkxtQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1d46fe7c274b8f2074cc08274070126b9e71f2a6d7d4739b522efaa4b84d391.exe
    "C:\Users\Admin\AppData\Local\Temp\c1d46fe7c274b8f2074cc08274070126b9e71f2a6d7d4739b522efaa4b84d391.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\wouov.exe
      "C:\Users\Admin\wouov.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wouov.exe

    Filesize

    216KB

    MD5

    e7b77e8c7dd4c1bfa2677ea74cd2c943

    SHA1

    02717f89ae1a5143bef2a5a77fc22e6d8e93f166

    SHA256

    30a2cf2a9e10a2ffa26dd63b253010001d7be9e31799f57e76c46ab3b48f3bf8

    SHA512

    482e3932d72d0848cfae56504405e7940641e37b6989c4c0e1898dab02223e501f97022b4284679c50abb8bfb4ac83b54da4d21e8d31ce113e39c1381d622a40

  • C:\Users\Admin\wouov.exe

    Filesize

    216KB

    MD5

    e7b77e8c7dd4c1bfa2677ea74cd2c943

    SHA1

    02717f89ae1a5143bef2a5a77fc22e6d8e93f166

    SHA256

    30a2cf2a9e10a2ffa26dd63b253010001d7be9e31799f57e76c46ab3b48f3bf8

    SHA512

    482e3932d72d0848cfae56504405e7940641e37b6989c4c0e1898dab02223e501f97022b4284679c50abb8bfb4ac83b54da4d21e8d31ce113e39c1381d622a40