Analysis

  • max time kernel
    153s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 04:06

General

  • Target

    a6456252a3bf90aa424e03324f88a1d7916584336f9ac7812a21631e99fb8e3d.exe

  • Size

    152KB

  • MD5

    492f33f6ea403962a69837000859646a

  • SHA1

    0f84f9ebb924e946353b1151b35258ccfbc83dd5

  • SHA256

    a6456252a3bf90aa424e03324f88a1d7916584336f9ac7812a21631e99fb8e3d

  • SHA512

    77e8d24e3872c04bce23349ee5701d59548ac5d11bc58d52c7e34aa5d12caf561ea65169d86101141cf8fc6c89439e0008b9ac208a10307cdd30284b450269b4

  • SSDEEP

    3072:L32IpK9xKA9w2p4QZisLaazNiIIkyyqY4oQZiEZt:L39pKxY+1isuazgfkl/WZ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6456252a3bf90aa424e03324f88a1d7916584336f9ac7812a21631e99fb8e3d.exe
    "C:\Users\Admin\AppData\Local\Temp\a6456252a3bf90aa424e03324f88a1d7916584336f9ac7812a21631e99fb8e3d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\caiyoa.exe
      "C:\Users\Admin\caiyoa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\caiyoa.exe

    Filesize

    152KB

    MD5

    23802bb5d93e9b2668dbc289c1c32868

    SHA1

    8643131e6eda41b888ddbecdfa896c71bf59db45

    SHA256

    ec6451aad717a02744e9ae7a21147731076a0f229ba9ba0a8d37b4a96548a15b

    SHA512

    b7432b23761a2eb9060c4bd7b57098fdd803126a7f43d8942c133bf7d6cb69b3016f3ca8b4fe14486455701cffd3647e62ee6e159b254da24038ac39f0843f28

  • C:\Users\Admin\caiyoa.exe

    Filesize

    152KB

    MD5

    23802bb5d93e9b2668dbc289c1c32868

    SHA1

    8643131e6eda41b888ddbecdfa896c71bf59db45

    SHA256

    ec6451aad717a02744e9ae7a21147731076a0f229ba9ba0a8d37b4a96548a15b

    SHA512

    b7432b23761a2eb9060c4bd7b57098fdd803126a7f43d8942c133bf7d6cb69b3016f3ca8b4fe14486455701cffd3647e62ee6e159b254da24038ac39f0843f28

  • \Users\Admin\caiyoa.exe

    Filesize

    152KB

    MD5

    23802bb5d93e9b2668dbc289c1c32868

    SHA1

    8643131e6eda41b888ddbecdfa896c71bf59db45

    SHA256

    ec6451aad717a02744e9ae7a21147731076a0f229ba9ba0a8d37b4a96548a15b

    SHA512

    b7432b23761a2eb9060c4bd7b57098fdd803126a7f43d8942c133bf7d6cb69b3016f3ca8b4fe14486455701cffd3647e62ee6e159b254da24038ac39f0843f28

  • \Users\Admin\caiyoa.exe

    Filesize

    152KB

    MD5

    23802bb5d93e9b2668dbc289c1c32868

    SHA1

    8643131e6eda41b888ddbecdfa896c71bf59db45

    SHA256

    ec6451aad717a02744e9ae7a21147731076a0f229ba9ba0a8d37b4a96548a15b

    SHA512

    b7432b23761a2eb9060c4bd7b57098fdd803126a7f43d8942c133bf7d6cb69b3016f3ca8b4fe14486455701cffd3647e62ee6e159b254da24038ac39f0843f28

  • memory/1988-56-0x0000000075281000-0x0000000075283000-memory.dmp

    Filesize

    8KB