Analysis

  • max time kernel
    171s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 19:26

General

  • Target

    9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe

  • Size

    124KB

  • MD5

    0030ebcc93d3a9e0d8de19ecb66ba2b0

  • SHA1

    c3612cf8b71b0201d3710c106ef3336c76736642

  • SHA256

    9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c

  • SHA512

    bce810822e8972fb57ea6ebdcb4bfb548821722d85a3d3bff683e12b80f1e098721e3b6be11a67eca293e5294c288be8e3af7228983235a7a2adc0ecf391b78d

  • SSDEEP

    1536:5DbeEFFH1/67NxkiQixA+alh98r8Y9USv1jylgwo7JaSi:ZbeEFv/67gjH8ri82gwQU

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe
    "C:\Users\Admin\AppData\Local\Temp\9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\motiy.exe
      "C:\Users\Admin\motiy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\motiy.exe

    Filesize

    124KB

    MD5

    629684ea24cc3d670c59dcd4dcf66ba8

    SHA1

    28ca2ca1bcb2e6eaad590150667e9e56acf4d452

    SHA256

    64454a987a8a8ebdb352c2f7ed2ab88aed53d432a76b2385c2c10408edc402e9

    SHA512

    84025e1101784d02698dde8caf72649a5aabaf1f91ee8afe27978813eceba2d6b3adab81d44b6923e7f9eaa4405d88f322ef2aa47a716998ad96c7622e3b2f56

  • C:\Users\Admin\motiy.exe

    Filesize

    124KB

    MD5

    629684ea24cc3d670c59dcd4dcf66ba8

    SHA1

    28ca2ca1bcb2e6eaad590150667e9e56acf4d452

    SHA256

    64454a987a8a8ebdb352c2f7ed2ab88aed53d432a76b2385c2c10408edc402e9

    SHA512

    84025e1101784d02698dde8caf72649a5aabaf1f91ee8afe27978813eceba2d6b3adab81d44b6923e7f9eaa4405d88f322ef2aa47a716998ad96c7622e3b2f56

  • \Users\Admin\motiy.exe

    Filesize

    124KB

    MD5

    629684ea24cc3d670c59dcd4dcf66ba8

    SHA1

    28ca2ca1bcb2e6eaad590150667e9e56acf4d452

    SHA256

    64454a987a8a8ebdb352c2f7ed2ab88aed53d432a76b2385c2c10408edc402e9

    SHA512

    84025e1101784d02698dde8caf72649a5aabaf1f91ee8afe27978813eceba2d6b3adab81d44b6923e7f9eaa4405d88f322ef2aa47a716998ad96c7622e3b2f56

  • \Users\Admin\motiy.exe

    Filesize

    124KB

    MD5

    629684ea24cc3d670c59dcd4dcf66ba8

    SHA1

    28ca2ca1bcb2e6eaad590150667e9e56acf4d452

    SHA256

    64454a987a8a8ebdb352c2f7ed2ab88aed53d432a76b2385c2c10408edc402e9

    SHA512

    84025e1101784d02698dde8caf72649a5aabaf1f91ee8afe27978813eceba2d6b3adab81d44b6923e7f9eaa4405d88f322ef2aa47a716998ad96c7622e3b2f56

  • memory/2040-56-0x0000000075F51000-0x0000000075F53000-memory.dmp

    Filesize

    8KB