Analysis

  • max time kernel
    152s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 10:25

General

  • Target

    11f8c1f5b57eb30a70d0023f407d0725f4069b53901d03946b48e7728a23480a.exe

  • Size

    164KB

  • MD5

    f5435447e0ec599cb62a157eb5224191

  • SHA1

    1c33e85974121c927099886c339c5f313b917f13

  • SHA256

    11f8c1f5b57eb30a70d0023f407d0725f4069b53901d03946b48e7728a23480a

  • SHA512

    b1a5133cfb7b3af3e4ac3550b8a6a187210c813ec82f24c4f8c538423dc894d36a5e4c899f129a03cacc6355d58f4335c329717c6447862ef58fc21ab28c8a18

  • SSDEEP

    3072:dsWcISlNux6veiCi36JRbs4jwKWuRr6TQY3mBTzFJ0T727K:dsWcIMNux6mJDjwZuesY3uTzFJ0T72G

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11f8c1f5b57eb30a70d0023f407d0725f4069b53901d03946b48e7728a23480a.exe
    "C:\Users\Admin\AppData\Local\Temp\11f8c1f5b57eb30a70d0023f407d0725f4069b53901d03946b48e7728a23480a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Users\Admin\xsviih.exe
      "C:\Users\Admin\xsviih.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xsviih.exe

    Filesize

    164KB

    MD5

    a1779493b32efd7e290a143287fda72a

    SHA1

    e101e8185e9b3e6a83ea497ea8bbf01ab06d32d3

    SHA256

    07c26f944f35938dac4aab65234ebe8bd354b8ee4df2fecc4c41fb5e2d4521f4

    SHA512

    0b081dab2030110edd1428a0879801f60046d0f16d9b6a312da77effda352d89cacdf4079dade62453a6afbfb2d0be77d64fab5943744b49c55426bf405e7501

  • C:\Users\Admin\xsviih.exe

    Filesize

    164KB

    MD5

    a1779493b32efd7e290a143287fda72a

    SHA1

    e101e8185e9b3e6a83ea497ea8bbf01ab06d32d3

    SHA256

    07c26f944f35938dac4aab65234ebe8bd354b8ee4df2fecc4c41fb5e2d4521f4

    SHA512

    0b081dab2030110edd1428a0879801f60046d0f16d9b6a312da77effda352d89cacdf4079dade62453a6afbfb2d0be77d64fab5943744b49c55426bf405e7501

  • \Users\Admin\xsviih.exe

    Filesize

    164KB

    MD5

    a1779493b32efd7e290a143287fda72a

    SHA1

    e101e8185e9b3e6a83ea497ea8bbf01ab06d32d3

    SHA256

    07c26f944f35938dac4aab65234ebe8bd354b8ee4df2fecc4c41fb5e2d4521f4

    SHA512

    0b081dab2030110edd1428a0879801f60046d0f16d9b6a312da77effda352d89cacdf4079dade62453a6afbfb2d0be77d64fab5943744b49c55426bf405e7501

  • \Users\Admin\xsviih.exe

    Filesize

    164KB

    MD5

    a1779493b32efd7e290a143287fda72a

    SHA1

    e101e8185e9b3e6a83ea497ea8bbf01ab06d32d3

    SHA256

    07c26f944f35938dac4aab65234ebe8bd354b8ee4df2fecc4c41fb5e2d4521f4

    SHA512

    0b081dab2030110edd1428a0879801f60046d0f16d9b6a312da77effda352d89cacdf4079dade62453a6afbfb2d0be77d64fab5943744b49c55426bf405e7501

  • memory/1592-56-0x0000000074FB1000-0x0000000074FB3000-memory.dmp

    Filesize

    8KB