Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 20:47

General

  • Target

    61249cf05cc01e0b3a277950c37b7df7b9ee18407a0f43adbb2e651f53d7f7c5.exe

  • Size

    180KB

  • MD5

    6846efde0df4799903f7c726f653c680

  • SHA1

    ca347c618b70eb0c95e28bd844b9b802f91c78de

  • SHA256

    61249cf05cc01e0b3a277950c37b7df7b9ee18407a0f43adbb2e651f53d7f7c5

  • SHA512

    45bd131b6b63397adda735948b3e60901f192b1be2a166293c4f21576bedbd3c9b5e132326440028591802f9faf45e194aa989ecb3ec79957fa0b00646c685e7

  • SSDEEP

    3072:JyfdVAXY71idPAaWELGzMshNXTDFE+7jF6XTjaJ:JyfzAY+oXqFshNTDT756XTI

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61249cf05cc01e0b3a277950c37b7df7b9ee18407a0f43adbb2e651f53d7f7c5.exe
    "C:\Users\Admin\AppData\Local\Temp\61249cf05cc01e0b3a277950c37b7df7b9ee18407a0f43adbb2e651f53d7f7c5.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Users\Admin\poowuo.exe
      "C:\Users\Admin\poowuo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1792

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\poowuo.exe

          Filesize

          180KB

          MD5

          7dacb9cfe0f4f7e817dcfd212edc965f

          SHA1

          03f5789666e59d86c775dc6441406b89fdc2cad7

          SHA256

          1e612d53449115bd15bf3b74f2b8fa132ed8a15ef9fc422f71c9ffbcaf8d8599

          SHA512

          bf013eafe0cb3e400dfaf62e42a698eb08d5c944fd2f82079fc94823f626fc029ef01b632af61dd00310870f27ee11e25d6b6d90151915f97fe5808708503d99

        • C:\Users\Admin\poowuo.exe

          Filesize

          180KB

          MD5

          7dacb9cfe0f4f7e817dcfd212edc965f

          SHA1

          03f5789666e59d86c775dc6441406b89fdc2cad7

          SHA256

          1e612d53449115bd15bf3b74f2b8fa132ed8a15ef9fc422f71c9ffbcaf8d8599

          SHA512

          bf013eafe0cb3e400dfaf62e42a698eb08d5c944fd2f82079fc94823f626fc029ef01b632af61dd00310870f27ee11e25d6b6d90151915f97fe5808708503d99

        • \Users\Admin\poowuo.exe

          Filesize

          180KB

          MD5

          7dacb9cfe0f4f7e817dcfd212edc965f

          SHA1

          03f5789666e59d86c775dc6441406b89fdc2cad7

          SHA256

          1e612d53449115bd15bf3b74f2b8fa132ed8a15ef9fc422f71c9ffbcaf8d8599

          SHA512

          bf013eafe0cb3e400dfaf62e42a698eb08d5c944fd2f82079fc94823f626fc029ef01b632af61dd00310870f27ee11e25d6b6d90151915f97fe5808708503d99

        • \Users\Admin\poowuo.exe

          Filesize

          180KB

          MD5

          7dacb9cfe0f4f7e817dcfd212edc965f

          SHA1

          03f5789666e59d86c775dc6441406b89fdc2cad7

          SHA256

          1e612d53449115bd15bf3b74f2b8fa132ed8a15ef9fc422f71c9ffbcaf8d8599

          SHA512

          bf013eafe0cb3e400dfaf62e42a698eb08d5c944fd2f82079fc94823f626fc029ef01b632af61dd00310870f27ee11e25d6b6d90151915f97fe5808708503d99

        • memory/1476-56-0x0000000074C11000-0x0000000074C13000-memory.dmp

          Filesize

          8KB