Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 07:38

General

  • Target

    3ffb87b6ae6b4b442e5e246e74c07d8dbabd6bfca01ee5bed99f6229422cfbfd.exe

  • Size

    176KB

  • MD5

    3b24297b03fa71c7f1639eb5bc252455

  • SHA1

    31ecc8f8fac8ac9df930070cb3a04a7bf33b5d18

  • SHA256

    3ffb87b6ae6b4b442e5e246e74c07d8dbabd6bfca01ee5bed99f6229422cfbfd

  • SHA512

    8a55073736aa37833143b87a7dda969789affc3c92dbadc0be46a4a31d792c9f1e3f00fa7bc1b7d518a14337db81517efc6a830a10897122997139c2112afbe9

  • SSDEEP

    3072:zwh8C/nROzg7iiwJvXZETcbLn67kLpyRurohZbsn4KhWNUzMzGV5/bBD3yy7ulE:sh7YU7iiwJvXZETcbLn6YLProhZbsn4F

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ffb87b6ae6b4b442e5e246e74c07d8dbabd6bfca01ee5bed99f6229422cfbfd.exe
    "C:\Users\Admin\AppData\Local\Temp\3ffb87b6ae6b4b442e5e246e74c07d8dbabd6bfca01ee5bed99f6229422cfbfd.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\zzxoef.exe
      "C:\Users\Admin\zzxoef.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:900

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\zzxoef.exe

          Filesize

          176KB

          MD5

          57c24c54d7a6b553430c1277b86fea8c

          SHA1

          e3b0656065a108c824c4ba8616635924c850a4d7

          SHA256

          1bf5075ead4e36394f69f6308ef096973bcb718ce7b87decb5dd570a5ad62aaa

          SHA512

          547fed99943d2ee1469630fab411b47c3ec6afd2697c92f5aece99569f9de77bac5addeecffea8f594afc032254d81fc2f0a0baa6282967dfc456c9708a39b33

        • C:\Users\Admin\zzxoef.exe

          Filesize

          176KB

          MD5

          57c24c54d7a6b553430c1277b86fea8c

          SHA1

          e3b0656065a108c824c4ba8616635924c850a4d7

          SHA256

          1bf5075ead4e36394f69f6308ef096973bcb718ce7b87decb5dd570a5ad62aaa

          SHA512

          547fed99943d2ee1469630fab411b47c3ec6afd2697c92f5aece99569f9de77bac5addeecffea8f594afc032254d81fc2f0a0baa6282967dfc456c9708a39b33

        • \Users\Admin\zzxoef.exe

          Filesize

          176KB

          MD5

          57c24c54d7a6b553430c1277b86fea8c

          SHA1

          e3b0656065a108c824c4ba8616635924c850a4d7

          SHA256

          1bf5075ead4e36394f69f6308ef096973bcb718ce7b87decb5dd570a5ad62aaa

          SHA512

          547fed99943d2ee1469630fab411b47c3ec6afd2697c92f5aece99569f9de77bac5addeecffea8f594afc032254d81fc2f0a0baa6282967dfc456c9708a39b33

        • \Users\Admin\zzxoef.exe

          Filesize

          176KB

          MD5

          57c24c54d7a6b553430c1277b86fea8c

          SHA1

          e3b0656065a108c824c4ba8616635924c850a4d7

          SHA256

          1bf5075ead4e36394f69f6308ef096973bcb718ce7b87decb5dd570a5ad62aaa

          SHA512

          547fed99943d2ee1469630fab411b47c3ec6afd2697c92f5aece99569f9de77bac5addeecffea8f594afc032254d81fc2f0a0baa6282967dfc456c9708a39b33

        • memory/1324-56-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

          Filesize

          8KB