Analysis

  • max time kernel
    153s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 20:47

General

  • Target

    1051450fa15801730556210198a74ac9f36b38118ecbaf11f1a42d847c784882.exe

  • Size

    184KB

  • MD5

    79726420530d1692a12acf510afb9ce0

  • SHA1

    9d6065c340fd40a1580a0d80e008fb45465a0068

  • SHA256

    1051450fa15801730556210198a74ac9f36b38118ecbaf11f1a42d847c784882

  • SHA512

    23709ed343ddcdae51095a783e05fbb7afa346f1e1b5f8e3d62866c28af445f07e803ab4d7be926ff9035ee202f793af68b9438462fea67ead89676dc338036d

  • SSDEEP

    3072:y4Rg+CWoYTzCh46Knvmb7/D26ytQlw/Lg5q69srijEgS36:6Gpz6LKnvmb7/D26yQlw/Lg5qosriHSK

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1051450fa15801730556210198a74ac9f36b38118ecbaf11f1a42d847c784882.exe
    "C:\Users\Admin\AppData\Local\Temp\1051450fa15801730556210198a74ac9f36b38118ecbaf11f1a42d847c784882.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Users\Admin\hutes.exe
      "C:\Users\Admin\hutes.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1212

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\hutes.exe

          Filesize

          184KB

          MD5

          529283c3eed9f9767279775fcf8e1ee9

          SHA1

          6d22938bb9e0f259029257d76bd3376798c792a7

          SHA256

          553c321a0ed62ffb75804eac16350a06476d0332d0a2d8415df91f3c9d81c85b

          SHA512

          1b070440c61311c62316cf3d2c26f8d805c5e5617a50089250887ffbf0b9e8b943b1396c7075923f17a747f4e4a129fc41e9d086341548bcbf2f4a771579bd62

        • C:\Users\Admin\hutes.exe

          Filesize

          184KB

          MD5

          529283c3eed9f9767279775fcf8e1ee9

          SHA1

          6d22938bb9e0f259029257d76bd3376798c792a7

          SHA256

          553c321a0ed62ffb75804eac16350a06476d0332d0a2d8415df91f3c9d81c85b

          SHA512

          1b070440c61311c62316cf3d2c26f8d805c5e5617a50089250887ffbf0b9e8b943b1396c7075923f17a747f4e4a129fc41e9d086341548bcbf2f4a771579bd62

        • \Users\Admin\hutes.exe

          Filesize

          184KB

          MD5

          529283c3eed9f9767279775fcf8e1ee9

          SHA1

          6d22938bb9e0f259029257d76bd3376798c792a7

          SHA256

          553c321a0ed62ffb75804eac16350a06476d0332d0a2d8415df91f3c9d81c85b

          SHA512

          1b070440c61311c62316cf3d2c26f8d805c5e5617a50089250887ffbf0b9e8b943b1396c7075923f17a747f4e4a129fc41e9d086341548bcbf2f4a771579bd62

        • \Users\Admin\hutes.exe

          Filesize

          184KB

          MD5

          529283c3eed9f9767279775fcf8e1ee9

          SHA1

          6d22938bb9e0f259029257d76bd3376798c792a7

          SHA256

          553c321a0ed62ffb75804eac16350a06476d0332d0a2d8415df91f3c9d81c85b

          SHA512

          1b070440c61311c62316cf3d2c26f8d805c5e5617a50089250887ffbf0b9e8b943b1396c7075923f17a747f4e4a129fc41e9d086341548bcbf2f4a771579bd62

        • memory/916-56-0x0000000076091000-0x0000000076093000-memory.dmp

          Filesize

          8KB