Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 00:30

General

  • Target

    a5c01b5f8ee0caf1fb64941c0e1db370b02e8a2517c5088fdc5df1bc78892df1.exe

  • Size

    152KB

  • MD5

    6e3ff23a5b765ff6c8768ce39fe4af60

  • SHA1

    ed219ed7881c61aa433c6417649275dcaa135118

  • SHA256

    a5c01b5f8ee0caf1fb64941c0e1db370b02e8a2517c5088fdc5df1bc78892df1

  • SHA512

    eb39fdef65c1a0cb1953696db349378a008330344d5ef49fabb5075a753a017a81a3777f7de0d0cdf42c8e5971605d84d6d59602fbe10c2d64940be3062d0092

  • SSDEEP

    3072:0hUFgdTQtKrueiygR4O6avJamofCoE5j4oQ5:Jg9QtKSMgR56avUmXdk

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5c01b5f8ee0caf1fb64941c0e1db370b02e8a2517c5088fdc5df1bc78892df1.exe
    "C:\Users\Admin\AppData\Local\Temp\a5c01b5f8ee0caf1fb64941c0e1db370b02e8a2517c5088fdc5df1bc78892df1.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Users\Admin\rnnaip.exe
      "C:\Users\Admin\rnnaip.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rnnaip.exe

    Filesize

    152KB

    MD5

    a3116810e9c65bcdb7777cee74a4b2c3

    SHA1

    430a90f08e512d6d695c6a7895910fee3bfcba81

    SHA256

    5c1d866a44654f8c0ac50f0540c4c34c99067c52f8533717c205456eeefd7ef7

    SHA512

    b8b89896a9e5235941c95aa1ccd455294bd7018974b3d19f38cb076ceecd8c22d8623a71a275444f9fdaf8a697f014e6117cc2fbfcc09beee15651fca815cc8b

  • C:\Users\Admin\rnnaip.exe

    Filesize

    152KB

    MD5

    a3116810e9c65bcdb7777cee74a4b2c3

    SHA1

    430a90f08e512d6d695c6a7895910fee3bfcba81

    SHA256

    5c1d866a44654f8c0ac50f0540c4c34c99067c52f8533717c205456eeefd7ef7

    SHA512

    b8b89896a9e5235941c95aa1ccd455294bd7018974b3d19f38cb076ceecd8c22d8623a71a275444f9fdaf8a697f014e6117cc2fbfcc09beee15651fca815cc8b

  • \Users\Admin\rnnaip.exe

    Filesize

    152KB

    MD5

    a3116810e9c65bcdb7777cee74a4b2c3

    SHA1

    430a90f08e512d6d695c6a7895910fee3bfcba81

    SHA256

    5c1d866a44654f8c0ac50f0540c4c34c99067c52f8533717c205456eeefd7ef7

    SHA512

    b8b89896a9e5235941c95aa1ccd455294bd7018974b3d19f38cb076ceecd8c22d8623a71a275444f9fdaf8a697f014e6117cc2fbfcc09beee15651fca815cc8b

  • \Users\Admin\rnnaip.exe

    Filesize

    152KB

    MD5

    a3116810e9c65bcdb7777cee74a4b2c3

    SHA1

    430a90f08e512d6d695c6a7895910fee3bfcba81

    SHA256

    5c1d866a44654f8c0ac50f0540c4c34c99067c52f8533717c205456eeefd7ef7

    SHA512

    b8b89896a9e5235941c95aa1ccd455294bd7018974b3d19f38cb076ceecd8c22d8623a71a275444f9fdaf8a697f014e6117cc2fbfcc09beee15651fca815cc8b

  • memory/1464-56-0x00000000758B1000-0x00000000758B3000-memory.dmp

    Filesize

    8KB

  • memory/1704-59-0x0000000000000000-mapping.dmp