Analysis

  • max time kernel
    150s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 03:44

General

  • Target

    ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe

  • Size

    180KB

  • MD5

    580084454658f7559f3ad64eb73314c4

  • SHA1

    15831f495c9172ab607c8d53afa21a4b5d6ab266

  • SHA256

    ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e

  • SHA512

    029489fb4982410c6ab01e603cf596ebec9df288d0b5566416d7cacf65f81b9df0b8e0674d3f71b7e29c92268f80bfc216d99f33e15e223c963533990e2f4432

  • SSDEEP

    1536:Or0zzktutKMUG2cFksJY6LQBkRr7lvoqzv4cJ5J31:RvxzS6LQyte+xJ31

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe
    "C:\Users\Admin\AppData\Local\Temp\ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\wqxaej.exe
      "C:\Users\Admin\wqxaej.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wqxaej.exe

    Filesize

    180KB

    MD5

    e11260e3c3590e7c75f0f79e83b44ddb

    SHA1

    38fc0b764c9863a1fdf30cc4476202e9e245e5a5

    SHA256

    c5d5f9b13bee4f510568065d3ce5053bf2205e244fc3326a9591b2ca55551ce3

    SHA512

    23346fbbe1d5089e6a279a1d11f9d0c083da9b805efeab77cc8c0d6fde2a2c9867204aaae97c3051e889f2189026efacfe72da2b77fdf27986fa732aa40bc53d

  • C:\Users\Admin\wqxaej.exe

    Filesize

    180KB

    MD5

    e11260e3c3590e7c75f0f79e83b44ddb

    SHA1

    38fc0b764c9863a1fdf30cc4476202e9e245e5a5

    SHA256

    c5d5f9b13bee4f510568065d3ce5053bf2205e244fc3326a9591b2ca55551ce3

    SHA512

    23346fbbe1d5089e6a279a1d11f9d0c083da9b805efeab77cc8c0d6fde2a2c9867204aaae97c3051e889f2189026efacfe72da2b77fdf27986fa732aa40bc53d

  • \Users\Admin\wqxaej.exe

    Filesize

    180KB

    MD5

    e11260e3c3590e7c75f0f79e83b44ddb

    SHA1

    38fc0b764c9863a1fdf30cc4476202e9e245e5a5

    SHA256

    c5d5f9b13bee4f510568065d3ce5053bf2205e244fc3326a9591b2ca55551ce3

    SHA512

    23346fbbe1d5089e6a279a1d11f9d0c083da9b805efeab77cc8c0d6fde2a2c9867204aaae97c3051e889f2189026efacfe72da2b77fdf27986fa732aa40bc53d

  • \Users\Admin\wqxaej.exe

    Filesize

    180KB

    MD5

    e11260e3c3590e7c75f0f79e83b44ddb

    SHA1

    38fc0b764c9863a1fdf30cc4476202e9e245e5a5

    SHA256

    c5d5f9b13bee4f510568065d3ce5053bf2205e244fc3326a9591b2ca55551ce3

    SHA512

    23346fbbe1d5089e6a279a1d11f9d0c083da9b805efeab77cc8c0d6fde2a2c9867204aaae97c3051e889f2189026efacfe72da2b77fdf27986fa732aa40bc53d

  • memory/1768-56-0x0000000076961000-0x0000000076963000-memory.dmp

    Filesize

    8KB