Analysis

  • max time kernel
    170s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 23:45

General

  • Target

    a632ec32237374a4c48d657e3a35af4f59e61704bd9bff5bdf8fd8716a0f34c8.exe

  • Size

    84KB

  • MD5

    94f415d41857200d6b7dc748e8f112d7

  • SHA1

    b262bba105eb45b88b8937943b8a0b7d16de8747

  • SHA256

    a632ec32237374a4c48d657e3a35af4f59e61704bd9bff5bdf8fd8716a0f34c8

  • SHA512

    7d94a71ae0b1c538278b2433fac04f3e764987be14e3e229bb526833ac251370fcc78e57482b93a7b259f00b8f05fd0fdb53ec2de70e56503f47b0cd9d05ba3b

  • SSDEEP

    1536:v88yTb7bg4htUVGLG/wXJYeUj27dTGHq13i6E:0vUVeG/wXJY527Y

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a632ec32237374a4c48d657e3a35af4f59e61704bd9bff5bdf8fd8716a0f34c8.exe
    "C:\Users\Admin\AppData\Local\Temp\a632ec32237374a4c48d657e3a35af4f59e61704bd9bff5bdf8fd8716a0f34c8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\gstoy.exe
      "C:\Users\Admin\gstoy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gstoy.exe

    Filesize

    84KB

    MD5

    eda041b7ec1f799e56f86e6759608b38

    SHA1

    d882795a628939c4f8e2e1031f18b7e4d366451d

    SHA256

    7c7e0d7e860c96a0894b39860d757fe058f06925e56d671afbd9f6b9cb42ff1b

    SHA512

    4c8a2cdd630060933fa0404663d23a7ee2931032541e8f659aed50f0a1e979a7314cd083a518d0a6695daa6b5dbd318fc7c9827ceefbec73efed979bab5ab8cf

  • C:\Users\Admin\gstoy.exe

    Filesize

    84KB

    MD5

    eda041b7ec1f799e56f86e6759608b38

    SHA1

    d882795a628939c4f8e2e1031f18b7e4d366451d

    SHA256

    7c7e0d7e860c96a0894b39860d757fe058f06925e56d671afbd9f6b9cb42ff1b

    SHA512

    4c8a2cdd630060933fa0404663d23a7ee2931032541e8f659aed50f0a1e979a7314cd083a518d0a6695daa6b5dbd318fc7c9827ceefbec73efed979bab5ab8cf