Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 00:57

General

  • Target

    7f1a2328482e3c761f457cf818850d5c35493dfa3ab790fc01d3fc42a4fd6c7f.exe

  • Size

    80KB

  • MD5

    9c598a3a2ae0bba7b89548671bacf031

  • SHA1

    a18ed3ea0abf429c01dadfc75dddac5e435375aa

  • SHA256

    7f1a2328482e3c761f457cf818850d5c35493dfa3ab790fc01d3fc42a4fd6c7f

  • SHA512

    8d7d654345fc00d7d37845eb857cbdbdf0fa44d1d0b7d4152b73cfb97bd6c26bbecdb04f4a0fc62f9614025c7de498d8736f03a5eab28ff18c0bd10a476dd914

  • SSDEEP

    768:ev6nMfq8W4g3YdoSvc8ebdtF5EmpW/p/hxRSH9NxIkL9v/Q6sWz:evHgiozZKmpSFhxRSHdL9bsC

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f1a2328482e3c761f457cf818850d5c35493dfa3ab790fc01d3fc42a4fd6c7f.exe
    "C:\Users\Admin\AppData\Local\Temp\7f1a2328482e3c761f457cf818850d5c35493dfa3ab790fc01d3fc42a4fd6c7f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\rioahim.exe
      "C:\Users\Admin\rioahim.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:888
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 796
      2⤵
      • Program crash
      PID:1488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rioahim.exe

    Filesize

    80KB

    MD5

    e5fefc8ac31c702e6f68cd0d295f9ec6

    SHA1

    1e6ecc69eb08cf4009ceba60661e94caa617691b

    SHA256

    fa991547a76ea4f8fed1bcc31e6cc73f4d9ec71d6579cd75a5f1f0c242be4a97

    SHA512

    169d6315e59283681173a701add3cbeff5c78acde58293ae7196e237d76bc7263b8e650b9949b48b2f9664e5f5347dabba7e62fa35bff08fc3d0d673f1838d26

  • C:\Users\Admin\rioahim.exe

    Filesize

    80KB

    MD5

    e5fefc8ac31c702e6f68cd0d295f9ec6

    SHA1

    1e6ecc69eb08cf4009ceba60661e94caa617691b

    SHA256

    fa991547a76ea4f8fed1bcc31e6cc73f4d9ec71d6579cd75a5f1f0c242be4a97

    SHA512

    169d6315e59283681173a701add3cbeff5c78acde58293ae7196e237d76bc7263b8e650b9949b48b2f9664e5f5347dabba7e62fa35bff08fc3d0d673f1838d26

  • \Users\Admin\rioahim.exe

    Filesize

    80KB

    MD5

    e5fefc8ac31c702e6f68cd0d295f9ec6

    SHA1

    1e6ecc69eb08cf4009ceba60661e94caa617691b

    SHA256

    fa991547a76ea4f8fed1bcc31e6cc73f4d9ec71d6579cd75a5f1f0c242be4a97

    SHA512

    169d6315e59283681173a701add3cbeff5c78acde58293ae7196e237d76bc7263b8e650b9949b48b2f9664e5f5347dabba7e62fa35bff08fc3d0d673f1838d26

  • \Users\Admin\rioahim.exe

    Filesize

    80KB

    MD5

    e5fefc8ac31c702e6f68cd0d295f9ec6

    SHA1

    1e6ecc69eb08cf4009ceba60661e94caa617691b

    SHA256

    fa991547a76ea4f8fed1bcc31e6cc73f4d9ec71d6579cd75a5f1f0c242be4a97

    SHA512

    169d6315e59283681173a701add3cbeff5c78acde58293ae7196e237d76bc7263b8e650b9949b48b2f9664e5f5347dabba7e62fa35bff08fc3d0d673f1838d26

  • memory/1680-56-0x0000000075281000-0x0000000075283000-memory.dmp

    Filesize

    8KB