Analysis

  • max time kernel
    31s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 09:46

General

  • Target

    88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe

  • Size

    172KB

  • MD5

    ecfa3d3c258f1efb61df9848d865ffff

  • SHA1

    93290b217d946b3d04a78a5750bab3b1a785d778

  • SHA256

    88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e

  • SHA512

    9c6a579d43746a88657736a56e8c44b610a3c33505853d966d66eeb0f2c85bf3da141e704e7df0c89f3a9acd2ab01be984975db45405bc6329a2838b7766bb2e

  • SSDEEP

    3072:MzLFlCb3NwJAewZFIBtcH//2J399KVpT:+LU3mJxw5f/2Jt9Kz

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe
    "C:\Users\Admin\AppData\Local\Temp\88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Users\Admin\tptem.exe
      "C:\Users\Admin\tptem.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tptem.exe

    Filesize

    172KB

    MD5

    03f2c4cd21a24edb4a5a25f688afe47e

    SHA1

    9a3b34f0c2a8e780c3cf547e17090fb9cf398af5

    SHA256

    92f349f9df81338f8822f43eb03a215f1de0d573bce18ccdcc57c50497fc6b64

    SHA512

    40b8cd9c5a86508ea472382bd7e643b0ac1702aa07539f2bf893bec1781b5e17dca5628391cf761c28e85e1bf3ba8443007c4e4e6e24a74e3d6ddae117df75eb

  • C:\Users\Admin\tptem.exe

    Filesize

    172KB

    MD5

    03f2c4cd21a24edb4a5a25f688afe47e

    SHA1

    9a3b34f0c2a8e780c3cf547e17090fb9cf398af5

    SHA256

    92f349f9df81338f8822f43eb03a215f1de0d573bce18ccdcc57c50497fc6b64

    SHA512

    40b8cd9c5a86508ea472382bd7e643b0ac1702aa07539f2bf893bec1781b5e17dca5628391cf761c28e85e1bf3ba8443007c4e4e6e24a74e3d6ddae117df75eb

  • memory/5044-134-0x0000000000000000-mapping.dmp