Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2022, 17:32

General

  • Target

    b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe

  • Size

    104KB

  • MD5

    7b925a88d2d04f5dc7d58fe458a8736d

  • SHA1

    6b83e61b17ab0c25c702a5165b6ed3ff26b0d73a

  • SHA256

    b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48

  • SHA512

    26cccae5660e77b56f3d23c4f5a883158132244c02cd4522984876b399c762b736d8e8d3a3de8dc3836423fac1baefca44a244c5aa734faf312ecbab2ea1e661

  • SSDEEP

    1536:h3gxGx3PtbkuOL5vLJWnYlrbPMPXvPWPRPpPLCOzSo4BszKhyMee+FWMktOOqw9F:5gxQdErlLCO14BiKhyMN+FPLQ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe
    "C:\Users\Admin\AppData\Local\Temp\b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\zfjaof.exe
      "C:\Users\Admin\zfjaof.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zfjaof.exe

    Filesize

    104KB

    MD5

    4686bd22e435ba0d7730a0780174049b

    SHA1

    10d023d763da79cf23cc2a985dcaf5da1baec9c8

    SHA256

    60d924438c04fcb381ea50f17dbb7ef5757166c981b1a3127cd87f17a051d09c

    SHA512

    003a32748e751165a0853b68dd81db39585f692b2bbe8ce714e84c3fc575377b8c7d0f856444f4678c1b69ba65d601c61ba532063feaf451cbe086b4ba422db2

  • C:\Users\Admin\zfjaof.exe

    Filesize

    104KB

    MD5

    4686bd22e435ba0d7730a0780174049b

    SHA1

    10d023d763da79cf23cc2a985dcaf5da1baec9c8

    SHA256

    60d924438c04fcb381ea50f17dbb7ef5757166c981b1a3127cd87f17a051d09c

    SHA512

    003a32748e751165a0853b68dd81db39585f692b2bbe8ce714e84c3fc575377b8c7d0f856444f4678c1b69ba65d601c61ba532063feaf451cbe086b4ba422db2

  • \Users\Admin\zfjaof.exe

    Filesize

    104KB

    MD5

    4686bd22e435ba0d7730a0780174049b

    SHA1

    10d023d763da79cf23cc2a985dcaf5da1baec9c8

    SHA256

    60d924438c04fcb381ea50f17dbb7ef5757166c981b1a3127cd87f17a051d09c

    SHA512

    003a32748e751165a0853b68dd81db39585f692b2bbe8ce714e84c3fc575377b8c7d0f856444f4678c1b69ba65d601c61ba532063feaf451cbe086b4ba422db2

  • \Users\Admin\zfjaof.exe

    Filesize

    104KB

    MD5

    4686bd22e435ba0d7730a0780174049b

    SHA1

    10d023d763da79cf23cc2a985dcaf5da1baec9c8

    SHA256

    60d924438c04fcb381ea50f17dbb7ef5757166c981b1a3127cd87f17a051d09c

    SHA512

    003a32748e751165a0853b68dd81db39585f692b2bbe8ce714e84c3fc575377b8c7d0f856444f4678c1b69ba65d601c61ba532063feaf451cbe086b4ba422db2

  • memory/1272-56-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB