Analysis

  • max time kernel
    203s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 15:52

General

  • Target

    e13929a8306cfe9704651126e7163d476673787987dc289063bd292f568e7a12.exe

  • Size

    120KB

  • MD5

    1ea32e2476b8b3fc01981ccef6fdb0a4

  • SHA1

    ac1903b6fcd1835ee7895054293b78e60f3430ef

  • SHA256

    e13929a8306cfe9704651126e7163d476673787987dc289063bd292f568e7a12

  • SHA512

    c3997169a4abe120aa1ade331c4362d2137f6c8aa0667ec049572d63d0ae3acccac5de291098822db57b7a2d49d72a8094b4a4101ad23fa6def6c71fc8159c36

  • SSDEEP

    1536:6TvMEYA06ONWttA+M0KuPe+cq2+VbM5dtO2XhXTOkIHzEHPjzVddnSlv3g:6bh2eA+Mp+P2Rs2R0HgHPjztSO

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e13929a8306cfe9704651126e7163d476673787987dc289063bd292f568e7a12.exe
    "C:\Users\Admin\AppData\Local\Temp\e13929a8306cfe9704651126e7163d476673787987dc289063bd292f568e7a12.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Users\Admin\paeeh.exe
      "C:\Users\Admin\paeeh.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\paeeh.exe

    Filesize

    120KB

    MD5

    d6da4a181f42d1c7c0258cd200981f55

    SHA1

    3d3f2ec9dfb313dbc87e88d390ef67fa4ea5b3d9

    SHA256

    109033fc8c97679cf80c5f00116d10353a4ab6e7e86400f925e9d1afcb77f44b

    SHA512

    32fb14f1facd504d19f3527904e9bada8cc6382c192227e92b1e3fd17ccebb5c409480b83cdf7ed5adacfc274c6ee562eae155d90dffbfe773cd3448e0ffe3b2

  • C:\Users\Admin\paeeh.exe

    Filesize

    120KB

    MD5

    d6da4a181f42d1c7c0258cd200981f55

    SHA1

    3d3f2ec9dfb313dbc87e88d390ef67fa4ea5b3d9

    SHA256

    109033fc8c97679cf80c5f00116d10353a4ab6e7e86400f925e9d1afcb77f44b

    SHA512

    32fb14f1facd504d19f3527904e9bada8cc6382c192227e92b1e3fd17ccebb5c409480b83cdf7ed5adacfc274c6ee562eae155d90dffbfe773cd3448e0ffe3b2

  • memory/4672-134-0x0000000000000000-mapping.dmp