Analysis

  • max time kernel
    187s
  • max time network
    108s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 04:15

General

  • Target

    66b4f34267b06d09dd20e20ead1206846a45586e56109e69870c37c1f3632dc8.exe

  • Size

    220KB

  • MD5

    4de2a9d778cf6e878268cec83b117a40

  • SHA1

    01f646dc5ab7fa6489989d5aef6e03aa4028a133

  • SHA256

    66b4f34267b06d09dd20e20ead1206846a45586e56109e69870c37c1f3632dc8

  • SHA512

    69e841e1dd3297e0f24eaf7127768697e86179a77b338131e1d02e230a70aaa3fc9bc7b3f753c046bd20611215f07c6be15d9c6686a0227e59dd609d9551e4d5

  • SSDEEP

    3072:T/Ouv7kr8YUL4qx9RIHgil3UuhSa3U3dD8d6Oy+MIrnj3J+Nkq:TOeko15x9SHVeOj0V

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66b4f34267b06d09dd20e20ead1206846a45586e56109e69870c37c1f3632dc8.exe
    "C:\Users\Admin\AppData\Local\Temp\66b4f34267b06d09dd20e20ead1206846a45586e56109e69870c37c1f3632dc8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\piuteez.exe
      "C:\Users\Admin\piuteez.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1232

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\piuteez.exe

    Filesize

    220KB

    MD5

    853ac6bb12b83cbee0562b7b9cab6bbd

    SHA1

    3ccf9937cca7fb2b8a5270e9b96955685aabed43

    SHA256

    cf74eda9c40c3d04a5e1b2c17a5e240df7cadf6589ecfd9e23a10f57cf29ff47

    SHA512

    4c3ecbad0f17b832930a25f4d71196e78c9e1d4252ddb608c4bb7f8dab0dd31e8008a1e837692cf8816c1ea2c6405043e398c5fc749c5095bd0dd46683fc250c

  • C:\Users\Admin\piuteez.exe

    Filesize

    220KB

    MD5

    853ac6bb12b83cbee0562b7b9cab6bbd

    SHA1

    3ccf9937cca7fb2b8a5270e9b96955685aabed43

    SHA256

    cf74eda9c40c3d04a5e1b2c17a5e240df7cadf6589ecfd9e23a10f57cf29ff47

    SHA512

    4c3ecbad0f17b832930a25f4d71196e78c9e1d4252ddb608c4bb7f8dab0dd31e8008a1e837692cf8816c1ea2c6405043e398c5fc749c5095bd0dd46683fc250c

  • \Users\Admin\piuteez.exe

    Filesize

    220KB

    MD5

    853ac6bb12b83cbee0562b7b9cab6bbd

    SHA1

    3ccf9937cca7fb2b8a5270e9b96955685aabed43

    SHA256

    cf74eda9c40c3d04a5e1b2c17a5e240df7cadf6589ecfd9e23a10f57cf29ff47

    SHA512

    4c3ecbad0f17b832930a25f4d71196e78c9e1d4252ddb608c4bb7f8dab0dd31e8008a1e837692cf8816c1ea2c6405043e398c5fc749c5095bd0dd46683fc250c

  • \Users\Admin\piuteez.exe

    Filesize

    220KB

    MD5

    853ac6bb12b83cbee0562b7b9cab6bbd

    SHA1

    3ccf9937cca7fb2b8a5270e9b96955685aabed43

    SHA256

    cf74eda9c40c3d04a5e1b2c17a5e240df7cadf6589ecfd9e23a10f57cf29ff47

    SHA512

    4c3ecbad0f17b832930a25f4d71196e78c9e1d4252ddb608c4bb7f8dab0dd31e8008a1e837692cf8816c1ea2c6405043e398c5fc749c5095bd0dd46683fc250c

  • memory/920-56-0x0000000075661000-0x0000000075663000-memory.dmp

    Filesize

    8KB