Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 00:52

General

  • Target

    6b2d58563e9a4883f39cb956c8da7e49792f95139341670120927e214b30ca8c.exe

  • Size

    228KB

  • MD5

    b0235a2f84837f6ac43b99d2fd6c5aa7

  • SHA1

    74e0921f66295dfaa34e1e1361f016f74f108720

  • SHA256

    6b2d58563e9a4883f39cb956c8da7e49792f95139341670120927e214b30ca8c

  • SHA512

    21ef037163edc64f5ade95e42261351170f229c6a4bc756589d64abd1eb9b6aec52a167884bbca828f10d6a8879b4d6ba08507a2c7a88d6b6ee10000365b986d

  • SSDEEP

    6144:LKcBM3dwqsNy5ibpNjl4EqxF6snji81RUinKIC5j:Gc0dQxlV

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b2d58563e9a4883f39cb956c8da7e49792f95139341670120927e214b30ca8c.exe
    "C:\Users\Admin\AppData\Local\Temp\6b2d58563e9a4883f39cb956c8da7e49792f95139341670120927e214b30ca8c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\wuced.exe
      "C:\Users\Admin\wuced.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wuced.exe

    Filesize

    228KB

    MD5

    07138810f3d8eb1144a7acd4d8dda189

    SHA1

    07ff30b70f74e869216fde624221ee718aab0f98

    SHA256

    85a0acea779c04df729b46803fbd43388e1818d63cf7c10a87766ddbc058ed7a

    SHA512

    069f38812cccbf369dceaad6f6a432520ce0c3b03a81b74a73f2122d6cc7a0cf12c86f532db4d6ddff9cb04e9506d14f8f8df4a8a5d2427767e76dd48be285b8

  • C:\Users\Admin\wuced.exe

    Filesize

    228KB

    MD5

    07138810f3d8eb1144a7acd4d8dda189

    SHA1

    07ff30b70f74e869216fde624221ee718aab0f98

    SHA256

    85a0acea779c04df729b46803fbd43388e1818d63cf7c10a87766ddbc058ed7a

    SHA512

    069f38812cccbf369dceaad6f6a432520ce0c3b03a81b74a73f2122d6cc7a0cf12c86f532db4d6ddff9cb04e9506d14f8f8df4a8a5d2427767e76dd48be285b8

  • \Users\Admin\wuced.exe

    Filesize

    228KB

    MD5

    07138810f3d8eb1144a7acd4d8dda189

    SHA1

    07ff30b70f74e869216fde624221ee718aab0f98

    SHA256

    85a0acea779c04df729b46803fbd43388e1818d63cf7c10a87766ddbc058ed7a

    SHA512

    069f38812cccbf369dceaad6f6a432520ce0c3b03a81b74a73f2122d6cc7a0cf12c86f532db4d6ddff9cb04e9506d14f8f8df4a8a5d2427767e76dd48be285b8

  • \Users\Admin\wuced.exe

    Filesize

    228KB

    MD5

    07138810f3d8eb1144a7acd4d8dda189

    SHA1

    07ff30b70f74e869216fde624221ee718aab0f98

    SHA256

    85a0acea779c04df729b46803fbd43388e1818d63cf7c10a87766ddbc058ed7a

    SHA512

    069f38812cccbf369dceaad6f6a432520ce0c3b03a81b74a73f2122d6cc7a0cf12c86f532db4d6ddff9cb04e9506d14f8f8df4a8a5d2427767e76dd48be285b8

  • memory/1564-56-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

    Filesize

    8KB