Analysis

  • max time kernel
    158s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 10:23

General

  • Target

    9c733a54f4d70c1e2278e1376ccbc4d61dfdab8bab6d88bac81d9f45106c1db1.exe

  • Size

    296KB

  • MD5

    1b33e6b6432c0101919da1186ab13e50

  • SHA1

    9abcbc00ef510e41c941223f8039059cf75a980b

  • SHA256

    9c733a54f4d70c1e2278e1376ccbc4d61dfdab8bab6d88bac81d9f45106c1db1

  • SHA512

    98eb1de0aa3c598ea0c1553436740e52c62acc3010b1cf6c9279bdf24b5ea80d6163d02cdf001cebc240fb16952dfe8a548027602022e8215b8f183edf739044

  • SSDEEP

    6144:5/qRpYmR7qZ1R26ULRdSJz8qbtFibPGXs:5/727qZ1JU9dSJz8qbmLG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 13 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c733a54f4d70c1e2278e1376ccbc4d61dfdab8bab6d88bac81d9f45106c1db1.exe
    "C:\Users\Admin\AppData\Local\Temp\9c733a54f4d70c1e2278e1376ccbc4d61dfdab8bab6d88bac81d9f45106c1db1.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Users\Admin\miefeoq.exe
      "C:\Users\Admin\miefeoq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Maps connected drives based on registry
      • Drops autorun.inf file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\miefeoq.exe

    Filesize

    296KB

    MD5

    1b33e6b6432c0101919da1186ab13e50

    SHA1

    9abcbc00ef510e41c941223f8039059cf75a980b

    SHA256

    9c733a54f4d70c1e2278e1376ccbc4d61dfdab8bab6d88bac81d9f45106c1db1

    SHA512

    98eb1de0aa3c598ea0c1553436740e52c62acc3010b1cf6c9279bdf24b5ea80d6163d02cdf001cebc240fb16952dfe8a548027602022e8215b8f183edf739044

  • C:\Users\Admin\miefeoq.exe

    Filesize

    296KB

    MD5

    1b33e6b6432c0101919da1186ab13e50

    SHA1

    9abcbc00ef510e41c941223f8039059cf75a980b

    SHA256

    9c733a54f4d70c1e2278e1376ccbc4d61dfdab8bab6d88bac81d9f45106c1db1

    SHA512

    98eb1de0aa3c598ea0c1553436740e52c62acc3010b1cf6c9279bdf24b5ea80d6163d02cdf001cebc240fb16952dfe8a548027602022e8215b8f183edf739044