Analysis

  • max time kernel
    152s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2022 03:13

General

  • Target

    09103fbbddfd7258a8104aa6a0be416321cc3f537decc65e0efd396fd9dc4ce2.exe

  • Size

    280KB

  • MD5

    481ac75cafc6244167b7986234b401b5

  • SHA1

    32e62ba7ad788fb5d9523d0ff13001c4307b2411

  • SHA256

    09103fbbddfd7258a8104aa6a0be416321cc3f537decc65e0efd396fd9dc4ce2

  • SHA512

    06f88720415cb9e1bca0ba42b4057670610a298b08d620aa66d759e21ebce7fb0f8ab56305467db0bc01580550d62141af6c4466824e2d95256dfacc7c767bf3

  • SSDEEP

    6144:n/Yi3FRINO5WcBzjkBP18yAYU7vKd3EUXWidJhKnvmb7/D26XgZKIQ0OfsJy2DJK:nL3fINO5WcBzjkV183Kd3EUXWidJhKnQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09103fbbddfd7258a8104aa6a0be416321cc3f537decc65e0efd396fd9dc4ce2.exe
    "C:\Users\Admin\AppData\Local\Temp\09103fbbddfd7258a8104aa6a0be416321cc3f537decc65e0efd396fd9dc4ce2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\joyog.exe
      "C:\Users\Admin\joyog.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\joyog.exe

    Filesize

    280KB

    MD5

    e2fcf99a0a33fa56e63f769b1c6a57e0

    SHA1

    5663001e7a626af0d500d37d5e10577a2488ae10

    SHA256

    f208f4c2544611ff68f17ecb1ee5a7aca89c45db3b3fdec19787a691055ed193

    SHA512

    98f7703dccec650de557a902bb6d930beb4f84c88c7da2fb40392003b784109f706a54be13352bef6b312ba99dfd11f6f0b50af8d717b154b3739f603c7413b8

  • C:\Users\Admin\joyog.exe

    Filesize

    280KB

    MD5

    e2fcf99a0a33fa56e63f769b1c6a57e0

    SHA1

    5663001e7a626af0d500d37d5e10577a2488ae10

    SHA256

    f208f4c2544611ff68f17ecb1ee5a7aca89c45db3b3fdec19787a691055ed193

    SHA512

    98f7703dccec650de557a902bb6d930beb4f84c88c7da2fb40392003b784109f706a54be13352bef6b312ba99dfd11f6f0b50af8d717b154b3739f603c7413b8

  • memory/1708-135-0x0000000000000000-mapping.dmp

  • memory/1708-140-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1708-142-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/4920-134-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/4920-141-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB