Analysis

  • max time kernel
    152s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 03:55

General

  • Target

    6e0f7aa6da14de007849b7d7b4e0ac44bac5f57dde51381c7c0a9358d02a476c.exe

  • Size

    172KB

  • MD5

    23273806880ff230945a39c144f4e120

  • SHA1

    476c9acd353435b6598d9db0b624ed3cb9d30ace

  • SHA256

    6e0f7aa6da14de007849b7d7b4e0ac44bac5f57dde51381c7c0a9358d02a476c

  • SHA512

    c18dd3ef99abdd8187079bab73b2a12e041396e926508e449c3ac44682428f58e6cbfe498050bb2b1556bb36b2c80b42dbeebd7f4fdf029e5abc839693d9199b

  • SSDEEP

    3072:+QwlB5QqiwcCA0laletdpVinzswyAQjh/gSF3Ef3ykQoz7C4cG:oIqtc30l+2yzswyAQjh/gSF3Ef3ykQoH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e0f7aa6da14de007849b7d7b4e0ac44bac5f57dde51381c7c0a9358d02a476c.exe
    "C:\Users\Admin\AppData\Local\Temp\6e0f7aa6da14de007849b7d7b4e0ac44bac5f57dde51381c7c0a9358d02a476c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\diaovi.exe
      "C:\Users\Admin\diaovi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\diaovi.exe

    Filesize

    172KB

    MD5

    5600c357d2296d15deca3a75737ef671

    SHA1

    e1c32d597a9d5f04a2519834725c30be404c60ac

    SHA256

    d51168b4be0e88846efb5524bfb2e68fa6b0c7ff218aca870a317c440d2d5e4a

    SHA512

    c7bd0cdc336537c35509ec59c3fb07909ea8d39036cd8614a330ff5605fad812573da36be8a7b22f69b9986fa82916bee3e12bf538b9194675dc910d919333bc

  • C:\Users\Admin\diaovi.exe

    Filesize

    172KB

    MD5

    5600c357d2296d15deca3a75737ef671

    SHA1

    e1c32d597a9d5f04a2519834725c30be404c60ac

    SHA256

    d51168b4be0e88846efb5524bfb2e68fa6b0c7ff218aca870a317c440d2d5e4a

    SHA512

    c7bd0cdc336537c35509ec59c3fb07909ea8d39036cd8614a330ff5605fad812573da36be8a7b22f69b9986fa82916bee3e12bf538b9194675dc910d919333bc

  • \Users\Admin\diaovi.exe

    Filesize

    172KB

    MD5

    5600c357d2296d15deca3a75737ef671

    SHA1

    e1c32d597a9d5f04a2519834725c30be404c60ac

    SHA256

    d51168b4be0e88846efb5524bfb2e68fa6b0c7ff218aca870a317c440d2d5e4a

    SHA512

    c7bd0cdc336537c35509ec59c3fb07909ea8d39036cd8614a330ff5605fad812573da36be8a7b22f69b9986fa82916bee3e12bf538b9194675dc910d919333bc

  • \Users\Admin\diaovi.exe

    Filesize

    172KB

    MD5

    5600c357d2296d15deca3a75737ef671

    SHA1

    e1c32d597a9d5f04a2519834725c30be404c60ac

    SHA256

    d51168b4be0e88846efb5524bfb2e68fa6b0c7ff218aca870a317c440d2d5e4a

    SHA512

    c7bd0cdc336537c35509ec59c3fb07909ea8d39036cd8614a330ff5605fad812573da36be8a7b22f69b9986fa82916bee3e12bf538b9194675dc910d919333bc

  • memory/1384-56-0x0000000076701000-0x0000000076703000-memory.dmp

    Filesize

    8KB