Analysis

  • max time kernel
    188s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 10:24

General

  • Target

    51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe

  • Size

    156KB

  • MD5

    9760dcb81fdb189b7499580baac6af34

  • SHA1

    8ee4a71afa156ee6dfe3f01a6b6b8d5968f40f6b

  • SHA256

    51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd

  • SHA512

    3252e06b52f112f1b20657c18a51906e2708520d4527f24fa81f5b7055dd160b70256f936beb472623c397f983dec75a273c29182850b6ae6c9f19c7bec68a2e

  • SSDEEP

    3072:3sT0tVcx8jeFvB0Z/I8xSFJKxr2CrILdbdN:8xIcvqVuJyr2CMLxd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe
    "C:\Users\Admin\AppData\Local\Temp\51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Users\Admin\saofa.exe
      "C:\Users\Admin\saofa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\saofa.exe

    Filesize

    156KB

    MD5

    7a905c7bc54d11e196bf9a6374c9b061

    SHA1

    10fafe3a67347506d4e39e7b12a1f0d12b7b5c91

    SHA256

    d1689a9d4240f614f131d031fca541773bee95c1eaf58b0d9b210ff0d23a9d71

    SHA512

    1ddba98e2b1508f5ad39afca3741202b7ce594b7da666dba8743c8ea5ab7c225d8e2b0299ff65b7ddd7e50fd18d29f11693e97d1ab8ec56a36db2ea5467895ec

  • C:\Users\Admin\saofa.exe

    Filesize

    156KB

    MD5

    7a905c7bc54d11e196bf9a6374c9b061

    SHA1

    10fafe3a67347506d4e39e7b12a1f0d12b7b5c91

    SHA256

    d1689a9d4240f614f131d031fca541773bee95c1eaf58b0d9b210ff0d23a9d71

    SHA512

    1ddba98e2b1508f5ad39afca3741202b7ce594b7da666dba8743c8ea5ab7c225d8e2b0299ff65b7ddd7e50fd18d29f11693e97d1ab8ec56a36db2ea5467895ec

  • \Users\Admin\saofa.exe

    Filesize

    156KB

    MD5

    7a905c7bc54d11e196bf9a6374c9b061

    SHA1

    10fafe3a67347506d4e39e7b12a1f0d12b7b5c91

    SHA256

    d1689a9d4240f614f131d031fca541773bee95c1eaf58b0d9b210ff0d23a9d71

    SHA512

    1ddba98e2b1508f5ad39afca3741202b7ce594b7da666dba8743c8ea5ab7c225d8e2b0299ff65b7ddd7e50fd18d29f11693e97d1ab8ec56a36db2ea5467895ec

  • \Users\Admin\saofa.exe

    Filesize

    156KB

    MD5

    7a905c7bc54d11e196bf9a6374c9b061

    SHA1

    10fafe3a67347506d4e39e7b12a1f0d12b7b5c91

    SHA256

    d1689a9d4240f614f131d031fca541773bee95c1eaf58b0d9b210ff0d23a9d71

    SHA512

    1ddba98e2b1508f5ad39afca3741202b7ce594b7da666dba8743c8ea5ab7c225d8e2b0299ff65b7ddd7e50fd18d29f11693e97d1ab8ec56a36db2ea5467895ec

  • memory/1536-56-0x0000000075CF1000-0x0000000075CF3000-memory.dmp

    Filesize

    8KB