Analysis

  • max time kernel
    192s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 10:11

General

  • Target

    8d6af8d6119e0cd80a299eddbaa016f605d1691a7fc3143875e9e4b2780d474d.exe

  • Size

    268KB

  • MD5

    f802cf6e25407bba73adc7b41524f093

  • SHA1

    02f8ef281ebf0a60c5e7c47efd892bcfc034eeb9

  • SHA256

    8d6af8d6119e0cd80a299eddbaa016f605d1691a7fc3143875e9e4b2780d474d

  • SHA512

    bf8444852e34de423016073c484e2a2de47c196af67ba4ed66642891ff4973ad0758be369ad1caf76ae68a8352130f71c10cbdef76ac575786b6368ea2961d25

  • SSDEEP

    6144:yUwz2Eu+yV2PL9JhCNjKV6MG31luID8NLJTPxhMbmNPjiiSjl:yxMs0Nz8tJTZhMiif

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d6af8d6119e0cd80a299eddbaa016f605d1691a7fc3143875e9e4b2780d474d.exe
    "C:\Users\Admin\AppData\Local\Temp\8d6af8d6119e0cd80a299eddbaa016f605d1691a7fc3143875e9e4b2780d474d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\gouaz.exe
      "C:\Users\Admin\gouaz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gouaz.exe

    Filesize

    268KB

    MD5

    0e0fcad11e3aafbd4d0f07c735947a0f

    SHA1

    57d2bac3457cb7ec1914f21171462cd800014d6d

    SHA256

    65d3fbb0ca060f1ca4d0728a1e8c0975189ea24759e3bcca86a785b28150aae9

    SHA512

    2d9d7b15145203d6335e2b74f8b67feffc8c68565abfc7f9612e972608bde5fa99f7322385b97a937d81d59c01b914509c069b48df8b6bec0013ec6a8839ce15

  • C:\Users\Admin\gouaz.exe

    Filesize

    268KB

    MD5

    0e0fcad11e3aafbd4d0f07c735947a0f

    SHA1

    57d2bac3457cb7ec1914f21171462cd800014d6d

    SHA256

    65d3fbb0ca060f1ca4d0728a1e8c0975189ea24759e3bcca86a785b28150aae9

    SHA512

    2d9d7b15145203d6335e2b74f8b67feffc8c68565abfc7f9612e972608bde5fa99f7322385b97a937d81d59c01b914509c069b48df8b6bec0013ec6a8839ce15