Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 00:26

General

  • Target

    520067a803ad54386531d9e4e2489776e618f0c0ce1bed16ad55e3702b3f3c5b.exe

  • Size

    164KB

  • MD5

    7bdd87bc968896af030bedb18bff4f5d

  • SHA1

    65f8f0a9b7830e6af9f3e8f5aea76f1f9338438c

  • SHA256

    520067a803ad54386531d9e4e2489776e618f0c0ce1bed16ad55e3702b3f3c5b

  • SHA512

    324459644b944f9c576fce6b6e92d54998e6239e314efd1f4dc1d78e8892f550979e6f46cd87a7203855037a30ef09cae55635241ad2575b068638d08cea85b7

  • SSDEEP

    3072:f7VzBgEbV93WZy844f6G06r7bkcsN2b8NoDD:f7RbOQof6Gn7bkjK8+3

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\520067a803ad54386531d9e4e2489776e618f0c0ce1bed16ad55e3702b3f3c5b.exe
    "C:\Users\Admin\AppData\Local\Temp\520067a803ad54386531d9e4e2489776e618f0c0ce1bed16ad55e3702b3f3c5b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Users\Admin\daeto.exe
      "C:\Users\Admin\daeto.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\daeto.exe

          Filesize

          164KB

          MD5

          6594dbb2815f49ca92f0eea2027bfd4d

          SHA1

          2cb42e1dc1bbcf885a99f31ecb50ceb4c8e17828

          SHA256

          cae4450bd784c80d7d60f13477ba49a9743bd99f130606656ae2bd12140c950b

          SHA512

          6859939c898e8b03186cd85abae0dce1fecfc783dcd876a697a3103980d8c065dca5fa229e5d5d5fb55e10ccca34ad6d8b54e1a35316546db5898f2b1e912270

        • C:\Users\Admin\daeto.exe

          Filesize

          164KB

          MD5

          6594dbb2815f49ca92f0eea2027bfd4d

          SHA1

          2cb42e1dc1bbcf885a99f31ecb50ceb4c8e17828

          SHA256

          cae4450bd784c80d7d60f13477ba49a9743bd99f130606656ae2bd12140c950b

          SHA512

          6859939c898e8b03186cd85abae0dce1fecfc783dcd876a697a3103980d8c065dca5fa229e5d5d5fb55e10ccca34ad6d8b54e1a35316546db5898f2b1e912270

        • \Users\Admin\daeto.exe

          Filesize

          164KB

          MD5

          6594dbb2815f49ca92f0eea2027bfd4d

          SHA1

          2cb42e1dc1bbcf885a99f31ecb50ceb4c8e17828

          SHA256

          cae4450bd784c80d7d60f13477ba49a9743bd99f130606656ae2bd12140c950b

          SHA512

          6859939c898e8b03186cd85abae0dce1fecfc783dcd876a697a3103980d8c065dca5fa229e5d5d5fb55e10ccca34ad6d8b54e1a35316546db5898f2b1e912270

        • \Users\Admin\daeto.exe

          Filesize

          164KB

          MD5

          6594dbb2815f49ca92f0eea2027bfd4d

          SHA1

          2cb42e1dc1bbcf885a99f31ecb50ceb4c8e17828

          SHA256

          cae4450bd784c80d7d60f13477ba49a9743bd99f130606656ae2bd12140c950b

          SHA512

          6859939c898e8b03186cd85abae0dce1fecfc783dcd876a697a3103980d8c065dca5fa229e5d5d5fb55e10ccca34ad6d8b54e1a35316546db5898f2b1e912270

        • memory/896-56-0x0000000075E31000-0x0000000075E33000-memory.dmp

          Filesize

          8KB