Analysis

  • max time kernel
    151s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 00:38

General

  • Target

    8db275a34686e4178331a39eda1f0a8590f836b26e87dbd78dfe9d58c22d1beb.exe

  • Size

    180KB

  • MD5

    6f2ca4736181cb048e2c0ff3d40d1450

  • SHA1

    fbec14abe4fdecd858abf1c52385eb3f5d9d4157

  • SHA256

    8db275a34686e4178331a39eda1f0a8590f836b26e87dbd78dfe9d58c22d1beb

  • SHA512

    2139d4c5a60633a40a132b1a35a84c0007f438aa1abc28d3ed567f65211dff7a25fec416d067782b2da31882ed16bbda81a5c9863101b5414eb953c238f246bf

  • SSDEEP

    3072:KFKfLty1MlttMFz8o+F334VSlkfoyHYb/zCHPEhg5JN8x+eDfcAuQPUSYruln/:KFow1MltKaJkHHYb/zCHPEhg5JN8x+eb

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8db275a34686e4178331a39eda1f0a8590f836b26e87dbd78dfe9d58c22d1beb.exe
    "C:\Users\Admin\AppData\Local\Temp\8db275a34686e4178331a39eda1f0a8590f836b26e87dbd78dfe9d58c22d1beb.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Users\Admin\liapuow.exe
      "C:\Users\Admin\liapuow.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\liapuow.exe

    Filesize

    180KB

    MD5

    72eb7ae415e07d11cc14f1324cb91b60

    SHA1

    7ba92b1715d06fb6156b7c91926ea83ee9a4e29d

    SHA256

    b38eb9af4e0affcd9a8a80ec27a4083cef207c795f0ad9dac86de60bd1aa60fb

    SHA512

    2a3802609e896c0c6960f9386b6197460b04b6145a934320b8faad55151ff746c40c32c81c9b97677c202fe95f477660b474ce163d61eaf83a576e0d4a6fd932

  • C:\Users\Admin\liapuow.exe

    Filesize

    180KB

    MD5

    72eb7ae415e07d11cc14f1324cb91b60

    SHA1

    7ba92b1715d06fb6156b7c91926ea83ee9a4e29d

    SHA256

    b38eb9af4e0affcd9a8a80ec27a4083cef207c795f0ad9dac86de60bd1aa60fb

    SHA512

    2a3802609e896c0c6960f9386b6197460b04b6145a934320b8faad55151ff746c40c32c81c9b97677c202fe95f477660b474ce163d61eaf83a576e0d4a6fd932

  • \Users\Admin\liapuow.exe

    Filesize

    180KB

    MD5

    72eb7ae415e07d11cc14f1324cb91b60

    SHA1

    7ba92b1715d06fb6156b7c91926ea83ee9a4e29d

    SHA256

    b38eb9af4e0affcd9a8a80ec27a4083cef207c795f0ad9dac86de60bd1aa60fb

    SHA512

    2a3802609e896c0c6960f9386b6197460b04b6145a934320b8faad55151ff746c40c32c81c9b97677c202fe95f477660b474ce163d61eaf83a576e0d4a6fd932

  • \Users\Admin\liapuow.exe

    Filesize

    180KB

    MD5

    72eb7ae415e07d11cc14f1324cb91b60

    SHA1

    7ba92b1715d06fb6156b7c91926ea83ee9a4e29d

    SHA256

    b38eb9af4e0affcd9a8a80ec27a4083cef207c795f0ad9dac86de60bd1aa60fb

    SHA512

    2a3802609e896c0c6960f9386b6197460b04b6145a934320b8faad55151ff746c40c32c81c9b97677c202fe95f477660b474ce163d61eaf83a576e0d4a6fd932

  • memory/1160-59-0x0000000000000000-mapping.dmp

  • memory/1424-56-0x0000000076151000-0x0000000076153000-memory.dmp

    Filesize

    8KB