Analysis

  • max time kernel
    150s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 10:20

General

  • Target

    5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe

  • Size

    136KB

  • MD5

    3e7e2f2fc4d26139af9dddc06e5312da

  • SHA1

    932db87f895f7f50da1b1a657e3f2f53d61afdcf

  • SHA256

    5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515

  • SHA512

    71ad401dc07920131debefa17a39e97e7dd3dd137b12eb5f136147af6c15c3a62e73f219fe889dd7a0e44c62da7138bace837f99d65389094caa7f061317158b

  • SSDEEP

    3072:UyaRRG/J9t538E6tZqAwZh5dKzio3CfNynXp5ucK1FaOaB0W+A:7a9kAwWTSW+A

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe
    "C:\Users\Admin\AppData\Local\Temp\5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\xxyuj.exe
      "C:\Users\Admin\xxyuj.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1028

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\xxyuj.exe

          Filesize

          136KB

          MD5

          f991a69b854ec5f744b7ee248fac86c6

          SHA1

          e199aab3cca7613802ea2d01ebd86e0a2d4a70aa

          SHA256

          fbc6385335ecda70813b0806637e80863a751e97c61ce61f728e378a1a4d5f65

          SHA512

          8bfec2d16a5296c22ad2fea451ff38b482a10c099f2302424875a6591ce3142726318f4af6fc16fb9e1b4974d1051bcdf151862cbd8d45b695b9a83a60d6bc3d

        • C:\Users\Admin\xxyuj.exe

          Filesize

          136KB

          MD5

          f991a69b854ec5f744b7ee248fac86c6

          SHA1

          e199aab3cca7613802ea2d01ebd86e0a2d4a70aa

          SHA256

          fbc6385335ecda70813b0806637e80863a751e97c61ce61f728e378a1a4d5f65

          SHA512

          8bfec2d16a5296c22ad2fea451ff38b482a10c099f2302424875a6591ce3142726318f4af6fc16fb9e1b4974d1051bcdf151862cbd8d45b695b9a83a60d6bc3d

        • \Users\Admin\xxyuj.exe

          Filesize

          136KB

          MD5

          f991a69b854ec5f744b7ee248fac86c6

          SHA1

          e199aab3cca7613802ea2d01ebd86e0a2d4a70aa

          SHA256

          fbc6385335ecda70813b0806637e80863a751e97c61ce61f728e378a1a4d5f65

          SHA512

          8bfec2d16a5296c22ad2fea451ff38b482a10c099f2302424875a6591ce3142726318f4af6fc16fb9e1b4974d1051bcdf151862cbd8d45b695b9a83a60d6bc3d

        • \Users\Admin\xxyuj.exe

          Filesize

          136KB

          MD5

          f991a69b854ec5f744b7ee248fac86c6

          SHA1

          e199aab3cca7613802ea2d01ebd86e0a2d4a70aa

          SHA256

          fbc6385335ecda70813b0806637e80863a751e97c61ce61f728e378a1a4d5f65

          SHA512

          8bfec2d16a5296c22ad2fea451ff38b482a10c099f2302424875a6591ce3142726318f4af6fc16fb9e1b4974d1051bcdf151862cbd8d45b695b9a83a60d6bc3d

        • memory/1516-56-0x0000000075111000-0x0000000075113000-memory.dmp

          Filesize

          8KB