Analysis

  • max time kernel
    85s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 02:57

General

  • Target

    e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe

  • Size

    360KB

  • MD5

    49f682d2f4a314edf6fea18ce1744b60

  • SHA1

    3ea82dec2dac5a5c6b5d2fff8983b03ea13d0056

  • SHA256

    e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56

  • SHA512

    9c253abd6ab742f0ca2c198a888174b976aab7b995074dd840e7e0533bdeb1c46593bbe23651211d97b5c7a237e61bf15d027f7e58d3ddac772a9d9f1bb6cfe7

  • SSDEEP

    6144:KGTTBOV6r4UZN6tj3tjuPQxD4b8/RqIsSp7ibSaZt/DIT4WT:lOVrUZN6tj99D4b8/EIsSp7ibSaZh0TV

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe
    "C:\Users\Admin\AppData\Local\Temp\e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\suaba.exe
      "C:\Users\Admin\suaba.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1168

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\suaba.exe

          Filesize

          360KB

          MD5

          4538ef2418c008d91597d9271fac7322

          SHA1

          4a9eb40fab0340930b704a990d836f8b29051a8d

          SHA256

          e73b7f36a6d663e8b6d4292fba9d90948454c825e613de15499c34100055ccfb

          SHA512

          fa0e60fd0a5fdf815b69f38adb48bfcc6930300d2ee7ac24649ea70cd7a459f0b04486eb9b566e85207850ff27edd2df1dd8446ee8980c843646b575f913edc4

        • C:\Users\Admin\suaba.exe

          Filesize

          360KB

          MD5

          4538ef2418c008d91597d9271fac7322

          SHA1

          4a9eb40fab0340930b704a990d836f8b29051a8d

          SHA256

          e73b7f36a6d663e8b6d4292fba9d90948454c825e613de15499c34100055ccfb

          SHA512

          fa0e60fd0a5fdf815b69f38adb48bfcc6930300d2ee7ac24649ea70cd7a459f0b04486eb9b566e85207850ff27edd2df1dd8446ee8980c843646b575f913edc4

        • \Users\Admin\suaba.exe

          Filesize

          360KB

          MD5

          4538ef2418c008d91597d9271fac7322

          SHA1

          4a9eb40fab0340930b704a990d836f8b29051a8d

          SHA256

          e73b7f36a6d663e8b6d4292fba9d90948454c825e613de15499c34100055ccfb

          SHA512

          fa0e60fd0a5fdf815b69f38adb48bfcc6930300d2ee7ac24649ea70cd7a459f0b04486eb9b566e85207850ff27edd2df1dd8446ee8980c843646b575f913edc4

        • \Users\Admin\suaba.exe

          Filesize

          360KB

          MD5

          4538ef2418c008d91597d9271fac7322

          SHA1

          4a9eb40fab0340930b704a990d836f8b29051a8d

          SHA256

          e73b7f36a6d663e8b6d4292fba9d90948454c825e613de15499c34100055ccfb

          SHA512

          fa0e60fd0a5fdf815b69f38adb48bfcc6930300d2ee7ac24649ea70cd7a459f0b04486eb9b566e85207850ff27edd2df1dd8446ee8980c843646b575f913edc4

        • memory/1516-56-0x0000000075841000-0x0000000075843000-memory.dmp

          Filesize

          8KB