Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2022 02:57

General

  • Target

    d246e973a2f2204a2a19c79eb9b9a626fe5bfb9b104d67aa7a8287991cdcded8.exe

  • Size

    240KB

  • MD5

    ab719891e5c2fdbcf46dbba611c503f7

  • SHA1

    fae3e946d1b0ed9c0911b8d34c749e68e29e7e10

  • SHA256

    d246e973a2f2204a2a19c79eb9b9a626fe5bfb9b104d67aa7a8287991cdcded8

  • SHA512

    c493b36267fa0f79dd8417a7c69f979f2eab25d7218253172521e79cf4bbf43257faaf53f2c01f9079fcc45763d907a2783f7d2809562e7b9a42408702a910af

  • SSDEEP

    3072:BkBrtXT8j6VlpuBd90i/SmWKLi7CjFSivnfu3fbMdozt5czH/S:Bma0UGKGkFRKfeoztOe

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d246e973a2f2204a2a19c79eb9b9a626fe5bfb9b104d67aa7a8287991cdcded8.exe
    "C:\Users\Admin\AppData\Local\Temp\d246e973a2f2204a2a19c79eb9b9a626fe5bfb9b104d67aa7a8287991cdcded8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Users\Admin\sianao.exe
      "C:\Users\Admin\sianao.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\sianao.exe

    Filesize

    240KB

    MD5

    664421328316a889ba9b1a53fc158566

    SHA1

    530bfe92477a5b1d21a2910ecc74807df1791a9b

    SHA256

    8760d143fb19b12b5783c6b3e4b5c24a644358f93669a1c368affbe0c713323b

    SHA512

    e4387b3081981096a91caf9ed1ec6ded6a176421f7d41369f60540a8e4c73c14a76187bcef87646221d73f584a0be36ca0fa5871b63079dcf0bfb29125ce2a12

  • C:\Users\Admin\sianao.exe

    Filesize

    240KB

    MD5

    664421328316a889ba9b1a53fc158566

    SHA1

    530bfe92477a5b1d21a2910ecc74807df1791a9b

    SHA256

    8760d143fb19b12b5783c6b3e4b5c24a644358f93669a1c368affbe0c713323b

    SHA512

    e4387b3081981096a91caf9ed1ec6ded6a176421f7d41369f60540a8e4c73c14a76187bcef87646221d73f584a0be36ca0fa5871b63079dcf0bfb29125ce2a12

  • memory/4860-134-0x0000000000000000-mapping.dmp