Analysis

  • max time kernel
    151s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 16:35

General

  • Target

    18c3d59860d21348e2338ecc96e620479cda1a7513e1034791eaac33aa10f042.exe

  • Size

    212KB

  • MD5

    6212729be1fa171c7b5a704e501fd6a3

  • SHA1

    bc39007f3d0b342560b3fb6642eed05efae3f37d

  • SHA256

    18c3d59860d21348e2338ecc96e620479cda1a7513e1034791eaac33aa10f042

  • SHA512

    e565b783579e4948228aaeb9af2b3d0adf4f3a9de4338989a7e95e62e97b23e486618675a539c187b20987e7fb89b832ae7c3d7c51d5e7246d9b436956ffb83f

  • SSDEEP

    3072:ZJWf33OCzgWNcssT2SSXzBNVATA9ZpqT4c36I/odrb/q:ZJggWRsTKBNVATA9Z885tdf/q

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18c3d59860d21348e2338ecc96e620479cda1a7513e1034791eaac33aa10f042.exe
    "C:\Users\Admin\AppData\Local\Temp\18c3d59860d21348e2338ecc96e620479cda1a7513e1034791eaac33aa10f042.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\foiiyow.exe
      "C:\Users\Admin\foiiyow.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\foiiyow.exe

    Filesize

    212KB

    MD5

    8435e7560a36bb4adf5ca603e7c00a32

    SHA1

    3b543876f6da7b25f132e1c6ff96f00c3f6fae1d

    SHA256

    bbb3346dafe6cf44f0f77508f6e7d4a4cac4a51257fc2c13594170e545177bb7

    SHA512

    89373fd8465d1dd0636e3eb9f557d4bdf09663a56d1e78073e44dc2fe1cb6ec0436b54ba234d16e03554bf040053ecaaa1c0630c7e4791ac7f46b7e7a1852850

  • C:\Users\Admin\foiiyow.exe

    Filesize

    212KB

    MD5

    8435e7560a36bb4adf5ca603e7c00a32

    SHA1

    3b543876f6da7b25f132e1c6ff96f00c3f6fae1d

    SHA256

    bbb3346dafe6cf44f0f77508f6e7d4a4cac4a51257fc2c13594170e545177bb7

    SHA512

    89373fd8465d1dd0636e3eb9f557d4bdf09663a56d1e78073e44dc2fe1cb6ec0436b54ba234d16e03554bf040053ecaaa1c0630c7e4791ac7f46b7e7a1852850

  • \Users\Admin\foiiyow.exe

    Filesize

    212KB

    MD5

    8435e7560a36bb4adf5ca603e7c00a32

    SHA1

    3b543876f6da7b25f132e1c6ff96f00c3f6fae1d

    SHA256

    bbb3346dafe6cf44f0f77508f6e7d4a4cac4a51257fc2c13594170e545177bb7

    SHA512

    89373fd8465d1dd0636e3eb9f557d4bdf09663a56d1e78073e44dc2fe1cb6ec0436b54ba234d16e03554bf040053ecaaa1c0630c7e4791ac7f46b7e7a1852850

  • \Users\Admin\foiiyow.exe

    Filesize

    212KB

    MD5

    8435e7560a36bb4adf5ca603e7c00a32

    SHA1

    3b543876f6da7b25f132e1c6ff96f00c3f6fae1d

    SHA256

    bbb3346dafe6cf44f0f77508f6e7d4a4cac4a51257fc2c13594170e545177bb7

    SHA512

    89373fd8465d1dd0636e3eb9f557d4bdf09663a56d1e78073e44dc2fe1cb6ec0436b54ba234d16e03554bf040053ecaaa1c0630c7e4791ac7f46b7e7a1852850

  • memory/912-56-0x00000000761F1000-0x00000000761F3000-memory.dmp

    Filesize

    8KB