Analysis

  • max time kernel
    152s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 04:06

General

  • Target

    3e807ea0646c72d0ada49a2d03d668ea6d7a00956369cd8fb6be931f9704bcfe.exe

  • Size

    152KB

  • MD5

    5a51318d3b0a872098dcbbc5e4a41950

  • SHA1

    894fa17145550f5bffee2941bf7481e6a33d7971

  • SHA256

    3e807ea0646c72d0ada49a2d03d668ea6d7a00956369cd8fb6be931f9704bcfe

  • SHA512

    4389057cd2450b1d3d00d1e5daf8734b966adb573f3165a119b468416d3498d1d7209c132c1e17cd705fd6754a2f452cc877387a71c895decb3c73720c2e989f

  • SSDEEP

    3072:T3D8IpK9xKA9w2p4QZisLaazNiIIkyyqN4oQZiENIx2r:T3DrpKxY+1isuazgfklcWMxq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e807ea0646c72d0ada49a2d03d668ea6d7a00956369cd8fb6be931f9704bcfe.exe
    "C:\Users\Admin\AppData\Local\Temp\3e807ea0646c72d0ada49a2d03d668ea6d7a00956369cd8fb6be931f9704bcfe.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\neaar.exe
      "C:\Users\Admin\neaar.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1396

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\neaar.exe

          Filesize

          152KB

          MD5

          3c15af9d3d98226a116f83bbe95a7b8a

          SHA1

          f7c5fd50f3ff2717267466ec464db5178a0410c1

          SHA256

          f436dcd53849e4f4f21aca4f3b5de05e16679ac1a103e14874250d396b13b3ba

          SHA512

          6ba7f399574eb62c26a484f07d09ce2ff2140a0ed3a38b114983730456df15a50e23826316a6521801a7a7475189e59108562e79573c0518bd3b5eaf20216418

        • C:\Users\Admin\neaar.exe

          Filesize

          152KB

          MD5

          3c15af9d3d98226a116f83bbe95a7b8a

          SHA1

          f7c5fd50f3ff2717267466ec464db5178a0410c1

          SHA256

          f436dcd53849e4f4f21aca4f3b5de05e16679ac1a103e14874250d396b13b3ba

          SHA512

          6ba7f399574eb62c26a484f07d09ce2ff2140a0ed3a38b114983730456df15a50e23826316a6521801a7a7475189e59108562e79573c0518bd3b5eaf20216418

        • \Users\Admin\neaar.exe

          Filesize

          152KB

          MD5

          3c15af9d3d98226a116f83bbe95a7b8a

          SHA1

          f7c5fd50f3ff2717267466ec464db5178a0410c1

          SHA256

          f436dcd53849e4f4f21aca4f3b5de05e16679ac1a103e14874250d396b13b3ba

          SHA512

          6ba7f399574eb62c26a484f07d09ce2ff2140a0ed3a38b114983730456df15a50e23826316a6521801a7a7475189e59108562e79573c0518bd3b5eaf20216418

        • \Users\Admin\neaar.exe

          Filesize

          152KB

          MD5

          3c15af9d3d98226a116f83bbe95a7b8a

          SHA1

          f7c5fd50f3ff2717267466ec464db5178a0410c1

          SHA256

          f436dcd53849e4f4f21aca4f3b5de05e16679ac1a103e14874250d396b13b3ba

          SHA512

          6ba7f399574eb62c26a484f07d09ce2ff2140a0ed3a38b114983730456df15a50e23826316a6521801a7a7475189e59108562e79573c0518bd3b5eaf20216418

        • memory/1652-56-0x0000000075D01000-0x0000000075D03000-memory.dmp

          Filesize

          8KB