Analysis

  • max time kernel
    153s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 20:26

General

  • Target

    072b23420d45a89ddbc232a70f7cf08980a4539228fe6e092208523d42d51946.exe

  • Size

    260KB

  • MD5

    68783982570e9f4db68fb3b73604f2d4

  • SHA1

    33193f7080f148ed4554239057a67ba17e7e3fa0

  • SHA256

    072b23420d45a89ddbc232a70f7cf08980a4539228fe6e092208523d42d51946

  • SHA512

    7add90ad7438c9ac68f0533b2336e5ccc499fc7b69f8a6ed96f901b9e506db7a01e180bb5cc8b17bdfa51307703c18d998a4d1f27f1809cb569cf3a4e5c1e474

  • SSDEEP

    6144:cCBZxrVG3zzyXcM9ZoxtoFIZ93Cv8A/DPPiZi6u:NNIzzyXcM9ZoxtoFIZ93Cv8A/DXau

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\072b23420d45a89ddbc232a70f7cf08980a4539228fe6e092208523d42d51946.exe
    "C:\Users\Admin\AppData\Local\Temp\072b23420d45a89ddbc232a70f7cf08980a4539228fe6e092208523d42d51946.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\fiewiu.exe
      "C:\Users\Admin\fiewiu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fiewiu.exe

    Filesize

    260KB

    MD5

    c8caf8b8054ec27f740560c1c9feea8a

    SHA1

    838e99046fdc7b80f1bb60a32bede349fb9f3671

    SHA256

    11a98b8563c4e60907d9a0a31dc81d83e9fce1ebaca274045aca9f3979a632dc

    SHA512

    8f488a9cfad07c5e8d5177fe0638be52888abf9421f6316be3f374ce1f697ccf70f38cb9198ac1bb5dd55bce4c05ceade107777e4f2d97a7776b7591f2e2a4f2

  • C:\Users\Admin\fiewiu.exe

    Filesize

    260KB

    MD5

    c8caf8b8054ec27f740560c1c9feea8a

    SHA1

    838e99046fdc7b80f1bb60a32bede349fb9f3671

    SHA256

    11a98b8563c4e60907d9a0a31dc81d83e9fce1ebaca274045aca9f3979a632dc

    SHA512

    8f488a9cfad07c5e8d5177fe0638be52888abf9421f6316be3f374ce1f697ccf70f38cb9198ac1bb5dd55bce4c05ceade107777e4f2d97a7776b7591f2e2a4f2

  • \Users\Admin\fiewiu.exe

    Filesize

    260KB

    MD5

    c8caf8b8054ec27f740560c1c9feea8a

    SHA1

    838e99046fdc7b80f1bb60a32bede349fb9f3671

    SHA256

    11a98b8563c4e60907d9a0a31dc81d83e9fce1ebaca274045aca9f3979a632dc

    SHA512

    8f488a9cfad07c5e8d5177fe0638be52888abf9421f6316be3f374ce1f697ccf70f38cb9198ac1bb5dd55bce4c05ceade107777e4f2d97a7776b7591f2e2a4f2

  • \Users\Admin\fiewiu.exe

    Filesize

    260KB

    MD5

    c8caf8b8054ec27f740560c1c9feea8a

    SHA1

    838e99046fdc7b80f1bb60a32bede349fb9f3671

    SHA256

    11a98b8563c4e60907d9a0a31dc81d83e9fce1ebaca274045aca9f3979a632dc

    SHA512

    8f488a9cfad07c5e8d5177fe0638be52888abf9421f6316be3f374ce1f697ccf70f38cb9198ac1bb5dd55bce4c05ceade107777e4f2d97a7776b7591f2e2a4f2

  • memory/1744-56-0x0000000076DC1000-0x0000000076DC3000-memory.dmp

    Filesize

    8KB