Analysis

  • max time kernel
    162s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 04:16

General

  • Target

    68d73e6b12bcd7caaf9a09b3fd0937c8568608844320bff7786bb43ab33bba84.exe

  • Size

    96KB

  • MD5

    42b299747e3ce00b521902d6a0380fe0

  • SHA1

    5d87f1133e7e19f2bc1452b324e1eafcb959722d

  • SHA256

    68d73e6b12bcd7caaf9a09b3fd0937c8568608844320bff7786bb43ab33bba84

  • SHA512

    810f8be5d6e4cfc03377b91959f7368c18350e3ffe6fbfac0ab07e2149c26c995b9ea2a40f0425e6518a677135f94a61045c5fca64bbfa19d393ad7b72830850

  • SSDEEP

    1536:M8QBHHf6cO/hSVkGulSc16l6u+NMMl/KlYv1Tq5ThF/NIjnZMe:u0hSylu8CFF/Cnie

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68d73e6b12bcd7caaf9a09b3fd0937c8568608844320bff7786bb43ab33bba84.exe
    "C:\Users\Admin\AppData\Local\Temp\68d73e6b12bcd7caaf9a09b3fd0937c8568608844320bff7786bb43ab33bba84.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\kueago.exe
      "C:\Users\Admin\kueago.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kueago.exe

    Filesize

    96KB

    MD5

    6ce2aa99f337b35f6e91b5d1b68d438b

    SHA1

    d952563b52d8ec7a5e6123abd1c59bc0b2fd4a91

    SHA256

    d54017a983d8a31bbaff08e4ed4ed7535a714876793dd2985e25c07c52167989

    SHA512

    9b5fba0b3674f90ae1eb2827015aa8ebc40b4640eeeb3c70681ee92572ad072f7a7db9b509f7db1d7986e4375cb57c182ea69a1bff857abf214cd3d366521b70

  • C:\Users\Admin\kueago.exe

    Filesize

    96KB

    MD5

    6ce2aa99f337b35f6e91b5d1b68d438b

    SHA1

    d952563b52d8ec7a5e6123abd1c59bc0b2fd4a91

    SHA256

    d54017a983d8a31bbaff08e4ed4ed7535a714876793dd2985e25c07c52167989

    SHA512

    9b5fba0b3674f90ae1eb2827015aa8ebc40b4640eeeb3c70681ee92572ad072f7a7db9b509f7db1d7986e4375cb57c182ea69a1bff857abf214cd3d366521b70

  • \Users\Admin\kueago.exe

    Filesize

    96KB

    MD5

    6ce2aa99f337b35f6e91b5d1b68d438b

    SHA1

    d952563b52d8ec7a5e6123abd1c59bc0b2fd4a91

    SHA256

    d54017a983d8a31bbaff08e4ed4ed7535a714876793dd2985e25c07c52167989

    SHA512

    9b5fba0b3674f90ae1eb2827015aa8ebc40b4640eeeb3c70681ee92572ad072f7a7db9b509f7db1d7986e4375cb57c182ea69a1bff857abf214cd3d366521b70

  • \Users\Admin\kueago.exe

    Filesize

    96KB

    MD5

    6ce2aa99f337b35f6e91b5d1b68d438b

    SHA1

    d952563b52d8ec7a5e6123abd1c59bc0b2fd4a91

    SHA256

    d54017a983d8a31bbaff08e4ed4ed7535a714876793dd2985e25c07c52167989

    SHA512

    9b5fba0b3674f90ae1eb2827015aa8ebc40b4640eeeb3c70681ee92572ad072f7a7db9b509f7db1d7986e4375cb57c182ea69a1bff857abf214cd3d366521b70

  • memory/676-67-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/676-71-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/856-56-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/856-57-0x0000000075711000-0x0000000075713000-memory.dmp

    Filesize

    8KB

  • memory/856-65-0x0000000002660000-0x0000000002679000-memory.dmp

    Filesize

    100KB

  • memory/856-66-0x0000000002660000-0x0000000002679000-memory.dmp

    Filesize

    100KB

  • memory/856-69-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/856-70-0x0000000002660000-0x0000000002679000-memory.dmp

    Filesize

    100KB