Analysis

  • max time kernel
    151s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 20:43

General

  • Target

    b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe

  • Size

    288KB

  • MD5

    7a49a64c1c434ebfa762642316279550

  • SHA1

    4d12200651b3e28c3a0932c6073d2ff66d25a3c6

  • SHA256

    b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8

  • SHA512

    05e9f595a48c0a4c246bf063eed00030486638a706f615eea7bc5d2c58a51d4f3667adeb93ae5d3491573879f5e82d5312452373dbecb3598a489b77cd59e132

  • SSDEEP

    6144:W4ibe9Cs07I0OjUEHg02cCh3FKphbYbYUG2yzOP+btEU:W4ii9CI0OoEHg02cCh3FKphbYbYUG2yV

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe
    "C:\Users\Admin\AppData\Local\Temp\b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\teziq.exe
      "C:\Users\Admin\teziq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:840

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\teziq.exe

          Filesize

          288KB

          MD5

          50659acf68fe36e547fedccabcf2916f

          SHA1

          11a387a11d1061baa827ea8dccd74c65136d5bfc

          SHA256

          78a918bb5a38329573b0755ff6ec1e510ac52d72bf691c72214f14190ded95d0

          SHA512

          5e8ebbc5a5d220a600def7caedfa94231dbd05b9f2e376c24580599181145048cc4bc9329459cf2d7b29b18ae4d3dccc35e08a1651f80b1234324287fea216bb

        • C:\Users\Admin\teziq.exe

          Filesize

          288KB

          MD5

          50659acf68fe36e547fedccabcf2916f

          SHA1

          11a387a11d1061baa827ea8dccd74c65136d5bfc

          SHA256

          78a918bb5a38329573b0755ff6ec1e510ac52d72bf691c72214f14190ded95d0

          SHA512

          5e8ebbc5a5d220a600def7caedfa94231dbd05b9f2e376c24580599181145048cc4bc9329459cf2d7b29b18ae4d3dccc35e08a1651f80b1234324287fea216bb

        • \Users\Admin\teziq.exe

          Filesize

          288KB

          MD5

          50659acf68fe36e547fedccabcf2916f

          SHA1

          11a387a11d1061baa827ea8dccd74c65136d5bfc

          SHA256

          78a918bb5a38329573b0755ff6ec1e510ac52d72bf691c72214f14190ded95d0

          SHA512

          5e8ebbc5a5d220a600def7caedfa94231dbd05b9f2e376c24580599181145048cc4bc9329459cf2d7b29b18ae4d3dccc35e08a1651f80b1234324287fea216bb

        • \Users\Admin\teziq.exe

          Filesize

          288KB

          MD5

          50659acf68fe36e547fedccabcf2916f

          SHA1

          11a387a11d1061baa827ea8dccd74c65136d5bfc

          SHA256

          78a918bb5a38329573b0755ff6ec1e510ac52d72bf691c72214f14190ded95d0

          SHA512

          5e8ebbc5a5d220a600def7caedfa94231dbd05b9f2e376c24580599181145048cc4bc9329459cf2d7b29b18ae4d3dccc35e08a1651f80b1234324287fea216bb

        • memory/1552-56-0x0000000075681000-0x0000000075683000-memory.dmp

          Filesize

          8KB