Analysis

  • max time kernel
    152s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2022, 14:06

General

  • Target

    2d9aec59bfac3ad46075242666cd7ac6b9f95e32a36b7730759626aba8f1a663.exe

  • Size

    136KB

  • MD5

    66b643180b3eede0c41e118fe849bae3

  • SHA1

    2b449e55ef27e98da953ff0d57aec3488c9d978b

  • SHA256

    2d9aec59bfac3ad46075242666cd7ac6b9f95e32a36b7730759626aba8f1a663

  • SHA512

    0ca33d38032f8fdac87f994ded1155d2497b574ec0be87c028206bc6fd7af7999db40c0c7f553551930d4e964d726ee7ecd7b8fba4b3b18ea5fc53e7eccc0bca

  • SSDEEP

    3072:BmeMlwjBfQn7WbIqH0ybZBiOllyEmcP82+aVdOt66VGegmp:BmgQn7WbIqH0ybZBiOllyE5D+aVkjseN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d9aec59bfac3ad46075242666cd7ac6b9f95e32a36b7730759626aba8f1a663.exe
    "C:\Users\Admin\AppData\Local\Temp\2d9aec59bfac3ad46075242666cd7ac6b9f95e32a36b7730759626aba8f1a663.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\bauge.exe
      "C:\Users\Admin\bauge.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:276

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\bauge.exe

          Filesize

          136KB

          MD5

          f8a3088cbe3acb7327f6934e9c17b5e0

          SHA1

          731b2bf187cb9b4c29504d575051b05e85caee8e

          SHA256

          89ed70fdb6957fe73626ffb78a0945349c65fb828dd87fe8cbea67f4de9bcb51

          SHA512

          008fe371747c41a1fab594c5ef04223da056e2c1b0762560cce20a94450dc9844d70246508772f7f71216a6a2e9e9f9d5c904598b8f76f3f5523cba800c87dbf

        • C:\Users\Admin\bauge.exe

          Filesize

          136KB

          MD5

          f8a3088cbe3acb7327f6934e9c17b5e0

          SHA1

          731b2bf187cb9b4c29504d575051b05e85caee8e

          SHA256

          89ed70fdb6957fe73626ffb78a0945349c65fb828dd87fe8cbea67f4de9bcb51

          SHA512

          008fe371747c41a1fab594c5ef04223da056e2c1b0762560cce20a94450dc9844d70246508772f7f71216a6a2e9e9f9d5c904598b8f76f3f5523cba800c87dbf

        • \Users\Admin\bauge.exe

          Filesize

          136KB

          MD5

          f8a3088cbe3acb7327f6934e9c17b5e0

          SHA1

          731b2bf187cb9b4c29504d575051b05e85caee8e

          SHA256

          89ed70fdb6957fe73626ffb78a0945349c65fb828dd87fe8cbea67f4de9bcb51

          SHA512

          008fe371747c41a1fab594c5ef04223da056e2c1b0762560cce20a94450dc9844d70246508772f7f71216a6a2e9e9f9d5c904598b8f76f3f5523cba800c87dbf

        • \Users\Admin\bauge.exe

          Filesize

          136KB

          MD5

          f8a3088cbe3acb7327f6934e9c17b5e0

          SHA1

          731b2bf187cb9b4c29504d575051b05e85caee8e

          SHA256

          89ed70fdb6957fe73626ffb78a0945349c65fb828dd87fe8cbea67f4de9bcb51

          SHA512

          008fe371747c41a1fab594c5ef04223da056e2c1b0762560cce20a94450dc9844d70246508772f7f71216a6a2e9e9f9d5c904598b8f76f3f5523cba800c87dbf

        • memory/1492-56-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

          Filesize

          8KB