Analysis

  • max time kernel
    173s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 03:11

General

  • Target

    9b13392e90a56adc83ab7abc0ad1d1fd0a2007a074595c57e3baa0c0eb45795f.exe

  • Size

    232KB

  • MD5

    6b945982862bd8ae7d1dcb7e8bb29690

  • SHA1

    d7390eca329ea1a0050e40cc2439b1c5cddac805

  • SHA256

    9b13392e90a56adc83ab7abc0ad1d1fd0a2007a074595c57e3baa0c0eb45795f

  • SHA512

    1a778d2f55f22da7736aed8424a5bfa1fdd6875b414620c6cb02dc62c9856d42825403ecfed3ea4b10005cd5da2b09f5bfa59817cbb77b48cff0df53ecf39102

  • SSDEEP

    3072:cpMeBcvWYwN1Smm727IJCkvIwXX4Ph0ApMX3KKl+Hv/91I/2XalDD:cpPBcvWYwN1S327Y54Ph0TX1kd18Ca

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b13392e90a56adc83ab7abc0ad1d1fd0a2007a074595c57e3baa0c0eb45795f.exe
    "C:\Users\Admin\AppData\Local\Temp\9b13392e90a56adc83ab7abc0ad1d1fd0a2007a074595c57e3baa0c0eb45795f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\gaoifu.exe
      "C:\Users\Admin\gaoifu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1420

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\gaoifu.exe

          Filesize

          232KB

          MD5

          61f7f07282a9a7baf81a8e40457c43fd

          SHA1

          12a02b18fcfebb8f7b2712501df97b3605d15854

          SHA256

          068a25777a44be534dec0bcc169c43df08a1794214d96f277d439adac758c81c

          SHA512

          86a1a26abd1a36c4b06e20a0c39f11ec8b1789dc8d79652c3596e01d8b91ae5a3262214afecb84cf05226e0096719ad4c505c40b70a3a109e4bab0c24cc752aa

        • C:\Users\Admin\gaoifu.exe

          Filesize

          232KB

          MD5

          61f7f07282a9a7baf81a8e40457c43fd

          SHA1

          12a02b18fcfebb8f7b2712501df97b3605d15854

          SHA256

          068a25777a44be534dec0bcc169c43df08a1794214d96f277d439adac758c81c

          SHA512

          86a1a26abd1a36c4b06e20a0c39f11ec8b1789dc8d79652c3596e01d8b91ae5a3262214afecb84cf05226e0096719ad4c505c40b70a3a109e4bab0c24cc752aa

        • \Users\Admin\gaoifu.exe

          Filesize

          232KB

          MD5

          61f7f07282a9a7baf81a8e40457c43fd

          SHA1

          12a02b18fcfebb8f7b2712501df97b3605d15854

          SHA256

          068a25777a44be534dec0bcc169c43df08a1794214d96f277d439adac758c81c

          SHA512

          86a1a26abd1a36c4b06e20a0c39f11ec8b1789dc8d79652c3596e01d8b91ae5a3262214afecb84cf05226e0096719ad4c505c40b70a3a109e4bab0c24cc752aa

        • \Users\Admin\gaoifu.exe

          Filesize

          232KB

          MD5

          61f7f07282a9a7baf81a8e40457c43fd

          SHA1

          12a02b18fcfebb8f7b2712501df97b3605d15854

          SHA256

          068a25777a44be534dec0bcc169c43df08a1794214d96f277d439adac758c81c

          SHA512

          86a1a26abd1a36c4b06e20a0c39f11ec8b1789dc8d79652c3596e01d8b91ae5a3262214afecb84cf05226e0096719ad4c505c40b70a3a109e4bab0c24cc752aa

        • memory/1916-56-0x0000000075C51000-0x0000000075C53000-memory.dmp

          Filesize

          8KB