Analysis

  • max time kernel
    160s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2022, 10:23

General

  • Target

    f82f4fb1cef86dfaa3a3d083a03297e44550088456a39bb072b3106ee401b5a7.exe

  • Size

    312KB

  • MD5

    68774256a410655c2fecace3fab59079

  • SHA1

    6ef3aed38e54a390766967858bb4a4c04919f022

  • SHA256

    f82f4fb1cef86dfaa3a3d083a03297e44550088456a39bb072b3106ee401b5a7

  • SHA512

    2e6e97bc7b48782a94d40d0de034c9feec559ecafca6f4bef0c2b38cc71bd3676ddaa47c7d55f1214fab6953d8467e47c808306d0c85adafea578f7379a997b5

  • SSDEEP

    6144:GY/FThz+4OAY0kmg7JXKj4vxim1EHlXnJJIyMAf5W/SbDHeIuy0bI:jrz+4OAY0kmg7JXKoyMAf5W/SbCIXW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f82f4fb1cef86dfaa3a3d083a03297e44550088456a39bb072b3106ee401b5a7.exe
    "C:\Users\Admin\AppData\Local\Temp\f82f4fb1cef86dfaa3a3d083a03297e44550088456a39bb072b3106ee401b5a7.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Users\Admin\feuej.exe
      "C:\Users\Admin\feuej.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:940

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\feuej.exe

          Filesize

          312KB

          MD5

          4219cd26749b377221a60fb14b58af59

          SHA1

          7d7a1695ffcc80fd952772d261342902b9c33e20

          SHA256

          eead143eb407a9c43be947ba90f6d82a11ae929d33f5f09f2a887dbbf6230dec

          SHA512

          bd9adb1f65289443bb7f2c2d568bee2b5502f5ae727d3aab3540e9a336796ac3af9c861d1f68e0b71c42c5bae62abe66d49036787162d20741d9a5f82a10b03b

        • C:\Users\Admin\feuej.exe

          Filesize

          312KB

          MD5

          4219cd26749b377221a60fb14b58af59

          SHA1

          7d7a1695ffcc80fd952772d261342902b9c33e20

          SHA256

          eead143eb407a9c43be947ba90f6d82a11ae929d33f5f09f2a887dbbf6230dec

          SHA512

          bd9adb1f65289443bb7f2c2d568bee2b5502f5ae727d3aab3540e9a336796ac3af9c861d1f68e0b71c42c5bae62abe66d49036787162d20741d9a5f82a10b03b

        • \Users\Admin\feuej.exe

          Filesize

          312KB

          MD5

          4219cd26749b377221a60fb14b58af59

          SHA1

          7d7a1695ffcc80fd952772d261342902b9c33e20

          SHA256

          eead143eb407a9c43be947ba90f6d82a11ae929d33f5f09f2a887dbbf6230dec

          SHA512

          bd9adb1f65289443bb7f2c2d568bee2b5502f5ae727d3aab3540e9a336796ac3af9c861d1f68e0b71c42c5bae62abe66d49036787162d20741d9a5f82a10b03b

        • \Users\Admin\feuej.exe

          Filesize

          312KB

          MD5

          4219cd26749b377221a60fb14b58af59

          SHA1

          7d7a1695ffcc80fd952772d261342902b9c33e20

          SHA256

          eead143eb407a9c43be947ba90f6d82a11ae929d33f5f09f2a887dbbf6230dec

          SHA512

          bd9adb1f65289443bb7f2c2d568bee2b5502f5ae727d3aab3540e9a336796ac3af9c861d1f68e0b71c42c5bae62abe66d49036787162d20741d9a5f82a10b03b

        • memory/940-66-0x0000000000400000-0x0000000000451000-memory.dmp

          Filesize

          324KB

        • memory/940-72-0x0000000000400000-0x0000000000451000-memory.dmp

          Filesize

          324KB

        • memory/1304-54-0x00000000762E1000-0x00000000762E3000-memory.dmp

          Filesize

          8KB

        • memory/1304-63-0x0000000002860000-0x00000000028B1000-memory.dmp

          Filesize

          324KB

        • memory/1304-64-0x0000000002860000-0x00000000028B1000-memory.dmp

          Filesize

          324KB

        • memory/1304-56-0x0000000000400000-0x0000000000451000-memory.dmp

          Filesize

          324KB

        • memory/1304-69-0x0000000000400000-0x0000000000451000-memory.dmp

          Filesize

          324KB

        • memory/1304-70-0x0000000002860000-0x00000000028B1000-memory.dmp

          Filesize

          324KB

        • memory/1304-71-0x0000000002860000-0x00000000028B1000-memory.dmp

          Filesize

          324KB