Analysis

  • max time kernel
    159s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 00:22

General

  • Target

    b08a33a628706a84e9df6dd83787bf362264194198ca8f127e81719d63cfa176.exe

  • Size

    216KB

  • MD5

    6c2ce7f50f69405b625bf79536481f50

  • SHA1

    07a4221b172aafa44f8d8093496e6de56fa9820a

  • SHA256

    b08a33a628706a84e9df6dd83787bf362264194198ca8f127e81719d63cfa176

  • SHA512

    3c1b20705755ef4890d5ac488853247858fea67d3299888d7f31c6907347b797659774e0d5f9e346a8608d44198feb0788ad78f514402cdb57c47a2770055c32

  • SSDEEP

    1536:HbJfHuJJLdJaB0reFl0QuWe305Xrud3VOSAumJ30h+3jE/gNlh1/7ND7zDT6WkXR:7a7ammjuwuJVguEh1jNJkX0CLijNX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b08a33a628706a84e9df6dd83787bf362264194198ca8f127e81719d63cfa176.exe
    "C:\Users\Admin\AppData\Local\Temp\b08a33a628706a84e9df6dd83787bf362264194198ca8f127e81719d63cfa176.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\jeeway.exe
      "C:\Users\Admin\jeeway.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jeeway.exe

    Filesize

    216KB

    MD5

    522aed15324f2bb027d4404e7dd933ab

    SHA1

    694693ac42749042fe1b41e5ee796199a9a52bd5

    SHA256

    782a639edeadbad016f9fecda09fe191052422f6612168460b0842f13b904dd6

    SHA512

    91b9ebd22479cf477a23691280ace970155ebc1afb19a914e30071248e4aaf7f0e166d1b8be1967e27938fbb14e031448fb618833faef219ad439306b1c151a8

  • C:\Users\Admin\jeeway.exe

    Filesize

    216KB

    MD5

    522aed15324f2bb027d4404e7dd933ab

    SHA1

    694693ac42749042fe1b41e5ee796199a9a52bd5

    SHA256

    782a639edeadbad016f9fecda09fe191052422f6612168460b0842f13b904dd6

    SHA512

    91b9ebd22479cf477a23691280ace970155ebc1afb19a914e30071248e4aaf7f0e166d1b8be1967e27938fbb14e031448fb618833faef219ad439306b1c151a8

  • \Users\Admin\jeeway.exe

    Filesize

    216KB

    MD5

    522aed15324f2bb027d4404e7dd933ab

    SHA1

    694693ac42749042fe1b41e5ee796199a9a52bd5

    SHA256

    782a639edeadbad016f9fecda09fe191052422f6612168460b0842f13b904dd6

    SHA512

    91b9ebd22479cf477a23691280ace970155ebc1afb19a914e30071248e4aaf7f0e166d1b8be1967e27938fbb14e031448fb618833faef219ad439306b1c151a8

  • \Users\Admin\jeeway.exe

    Filesize

    216KB

    MD5

    522aed15324f2bb027d4404e7dd933ab

    SHA1

    694693ac42749042fe1b41e5ee796199a9a52bd5

    SHA256

    782a639edeadbad016f9fecda09fe191052422f6612168460b0842f13b904dd6

    SHA512

    91b9ebd22479cf477a23691280ace970155ebc1afb19a914e30071248e4aaf7f0e166d1b8be1967e27938fbb14e031448fb618833faef219ad439306b1c151a8

  • memory/956-59-0x0000000000000000-mapping.dmp

  • memory/1756-56-0x0000000076871000-0x0000000076873000-memory.dmp

    Filesize

    8KB