Analysis

  • max time kernel
    152s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2022 10:15

General

  • Target

    79185e03c6c3ae5a2de42e96a4f9458761e093ae4a21c6a59e0c7fe2340f3f1f.exe

  • Size

    108KB

  • MD5

    68ce83a99796f379209b4f12e72e3bde

  • SHA1

    26521cba4561702867f70a633a7415133d430ede

  • SHA256

    79185e03c6c3ae5a2de42e96a4f9458761e093ae4a21c6a59e0c7fe2340f3f1f

  • SHA512

    e3203ab14321fc4099989efebd405c187265a7ee1689357fc99d27c544efb425447b5f4f4ed487d78a1fb045a955177fb9dcdfb55331e76717fd2a77263a3c96

  • SSDEEP

    1536:gXq8iAuismywsTQLw0wF9MGM9K/oKtNgCMbA1bL3N+NM5UfRvNIjnZjU:zTQ/KLOM52vCnh

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79185e03c6c3ae5a2de42e96a4f9458761e093ae4a21c6a59e0c7fe2340f3f1f.exe
    "C:\Users\Admin\AppData\Local\Temp\79185e03c6c3ae5a2de42e96a4f9458761e093ae4a21c6a59e0c7fe2340f3f1f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\biipiq.exe
      "C:\Users\Admin\biipiq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\biipiq.exe

    Filesize

    108KB

    MD5

    0733766c2e023cbdc2d0ce7e1066baa7

    SHA1

    45a2c592820ba79770515b72d79af2048461820f

    SHA256

    04dedc0c26d71ee654583188a4c42b70ccbe2c6ace0245ba7e953d1406ad0f49

    SHA512

    b5831da4120da6e0bda8058424bdb15f84f40371076682e2fe6a392dd3c6da068adcad36bf380189455837fbe0037886913ca99d2335451949544d6317e2154b

  • C:\Users\Admin\biipiq.exe

    Filesize

    108KB

    MD5

    0733766c2e023cbdc2d0ce7e1066baa7

    SHA1

    45a2c592820ba79770515b72d79af2048461820f

    SHA256

    04dedc0c26d71ee654583188a4c42b70ccbe2c6ace0245ba7e953d1406ad0f49

    SHA512

    b5831da4120da6e0bda8058424bdb15f84f40371076682e2fe6a392dd3c6da068adcad36bf380189455837fbe0037886913ca99d2335451949544d6317e2154b

  • \Users\Admin\biipiq.exe

    Filesize

    108KB

    MD5

    0733766c2e023cbdc2d0ce7e1066baa7

    SHA1

    45a2c592820ba79770515b72d79af2048461820f

    SHA256

    04dedc0c26d71ee654583188a4c42b70ccbe2c6ace0245ba7e953d1406ad0f49

    SHA512

    b5831da4120da6e0bda8058424bdb15f84f40371076682e2fe6a392dd3c6da068adcad36bf380189455837fbe0037886913ca99d2335451949544d6317e2154b

  • \Users\Admin\biipiq.exe

    Filesize

    108KB

    MD5

    0733766c2e023cbdc2d0ce7e1066baa7

    SHA1

    45a2c592820ba79770515b72d79af2048461820f

    SHA256

    04dedc0c26d71ee654583188a4c42b70ccbe2c6ace0245ba7e953d1406ad0f49

    SHA512

    b5831da4120da6e0bda8058424bdb15f84f40371076682e2fe6a392dd3c6da068adcad36bf380189455837fbe0037886913ca99d2335451949544d6317e2154b

  • memory/960-65-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/960-69-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/1848-56-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/1848-57-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB

  • memory/1848-64-0x0000000002E10000-0x0000000002E8C000-memory.dmp

    Filesize

    496KB

  • memory/1848-68-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB