Analysis

  • max time kernel
    157s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 14:31

General

  • Target

    d269bb5aa0ec98c2a9a52084099233410a3edd42b542980badd5e1ca2912f5ff.exe

  • Size

    180KB

  • MD5

    51c1566a66e969db8679aa121a0a0106

  • SHA1

    3432b3d48b04cc837c389ba32a69963b80df8d41

  • SHA256

    d269bb5aa0ec98c2a9a52084099233410a3edd42b542980badd5e1ca2912f5ff

  • SHA512

    ead2b01f68c8b34c9bff5da415345e7b92e59089827d7b59f604db48ef064263136da63550a517b94beae436147ad532bef8f3e1c25e9818bb2277f030e6a7ca

  • SSDEEP

    3072:980AqSC+y50cm1tnRd5GK/fObT/bGinhssp9nPVmvEfL2co3ZwURmkPiR/+5JS3a:KhqSC+Lcm1Dd0K/fObT/bGihssp1Vmvt

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d269bb5aa0ec98c2a9a52084099233410a3edd42b542980badd5e1ca2912f5ff.exe
    "C:\Users\Admin\AppData\Local\Temp\d269bb5aa0ec98c2a9a52084099233410a3edd42b542980badd5e1ca2912f5ff.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Users\Admin\leulil.exe
      "C:\Users\Admin\leulil.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4488

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\leulil.exe

          Filesize

          180KB

          MD5

          0f8a329b3424d3c804894a428daf4150

          SHA1

          d349bdc39be5121944b09b4f24109e97fc1a5da0

          SHA256

          1b77a541269a332701baee11019e5f14e2c570ed23447be7100c6cf26bc1e8af

          SHA512

          43676c7735e52798880e4039e56373f9a4e4d3a15ee3f41432422769adffb5596f0f17f7462ebf7856e399c66c2653a78512678d4a19023a444f65c258bf5f85

        • C:\Users\Admin\leulil.exe

          Filesize

          180KB

          MD5

          0f8a329b3424d3c804894a428daf4150

          SHA1

          d349bdc39be5121944b09b4f24109e97fc1a5da0

          SHA256

          1b77a541269a332701baee11019e5f14e2c570ed23447be7100c6cf26bc1e8af

          SHA512

          43676c7735e52798880e4039e56373f9a4e4d3a15ee3f41432422769adffb5596f0f17f7462ebf7856e399c66c2653a78512678d4a19023a444f65c258bf5f85