Analysis

  • max time kernel
    181s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 20:02

General

  • Target

    eddc7dddbee9155d07fb9603068971f1c2d2f13aaa72ac64dac7f8d735ff2466.exe

  • Size

    80KB

  • MD5

    cf8c701314ef1bf2043cb74eb4263c95

  • SHA1

    4bfc2826915e2c48329ed5358f98f6c3d976988c

  • SHA256

    eddc7dddbee9155d07fb9603068971f1c2d2f13aaa72ac64dac7f8d735ff2466

  • SHA512

    452b83f16427ecb8975dcc1b3156fbcdacfdba36ad68c0083371bb19cfaec1ddaecb7e7e03ab471e875b5e082527a589cf9e4a33f2c7828bd1dd5e07fd31d146

  • SSDEEP

    1536:vv7wLRUvKGlTGQxguIxZTAwlpwFJ0T72mocT:noSvrKxZfUFJ0T72mBT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eddc7dddbee9155d07fb9603068971f1c2d2f13aaa72ac64dac7f8d735ff2466.exe
    "C:\Users\Admin\AppData\Local\Temp\eddc7dddbee9155d07fb9603068971f1c2d2f13aaa72ac64dac7f8d735ff2466.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\btqial.exe
      "C:\Users\Admin\btqial.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\btqial.exe

    Filesize

    80KB

    MD5

    b0b23d84140b2aef4d98d1e7626f02f2

    SHA1

    0d883b06dc77574d97a22dad7054a5c4f0390165

    SHA256

    0e586c8ec311e7cd787cb7e16f3e1e7e2a6007291be7b334bb033071e236d03f

    SHA512

    bd4b5f3b10617917946f1c20e91b013b10c0dd18088e089cac9a7353938480c857552020e37c5b3579d536fc40ba308907e40c68dbe7e72e0a21b74d59a78ac8

  • C:\Users\Admin\btqial.exe

    Filesize

    80KB

    MD5

    b0b23d84140b2aef4d98d1e7626f02f2

    SHA1

    0d883b06dc77574d97a22dad7054a5c4f0390165

    SHA256

    0e586c8ec311e7cd787cb7e16f3e1e7e2a6007291be7b334bb033071e236d03f

    SHA512

    bd4b5f3b10617917946f1c20e91b013b10c0dd18088e089cac9a7353938480c857552020e37c5b3579d536fc40ba308907e40c68dbe7e72e0a21b74d59a78ac8