Analysis

  • max time kernel
    150s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2022 03:30

General

  • Target

    d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe

  • Size

    348KB

  • MD5

    2287ea0569ff4c181a0050da1a33595b

  • SHA1

    89eb589364d84823cd0cab91e7251eadec97e8e7

  • SHA256

    d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3

  • SHA512

    e0614cde0270bcb2661993e216d6f9c5ce0454b49b170d415e7e167335a0ff9510f121dc97d28b040828b36c50ca95aaf574ea963e5457c8c799d4af5bb89f3f

  • SSDEEP

    3072:ECXTo/0Yxyk0tQ9nLHbB9WPliBs2HWWEakGJm9cFso:ECusk4QxL7B9WPli+yWWEazH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe
    "C:\Users\Admin\AppData\Local\Temp\d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\saeej.exe
      "C:\Users\Admin\saeej.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\saeej.exe

    Filesize

    348KB

    MD5

    6a63fb1f5dae22a672f97cc260e463c5

    SHA1

    eb45b943af83f76dfa94032925817af70ba6178f

    SHA256

    6c1d5e45e777075f7afcff6820d0961f2f9dbc6f86337932b48543b678f2bb86

    SHA512

    6028f95292ab2b0358aa27e3b00c2363a6be12eecd74b400295b23cfe3c0e3bf393afe67ad53ee6e04bb392e9a3c99121f3c96eeb3afcdcf27b56258e5c7a9f1

  • C:\Users\Admin\saeej.exe

    Filesize

    348KB

    MD5

    6a63fb1f5dae22a672f97cc260e463c5

    SHA1

    eb45b943af83f76dfa94032925817af70ba6178f

    SHA256

    6c1d5e45e777075f7afcff6820d0961f2f9dbc6f86337932b48543b678f2bb86

    SHA512

    6028f95292ab2b0358aa27e3b00c2363a6be12eecd74b400295b23cfe3c0e3bf393afe67ad53ee6e04bb392e9a3c99121f3c96eeb3afcdcf27b56258e5c7a9f1

  • \Users\Admin\saeej.exe

    Filesize

    348KB

    MD5

    6a63fb1f5dae22a672f97cc260e463c5

    SHA1

    eb45b943af83f76dfa94032925817af70ba6178f

    SHA256

    6c1d5e45e777075f7afcff6820d0961f2f9dbc6f86337932b48543b678f2bb86

    SHA512

    6028f95292ab2b0358aa27e3b00c2363a6be12eecd74b400295b23cfe3c0e3bf393afe67ad53ee6e04bb392e9a3c99121f3c96eeb3afcdcf27b56258e5c7a9f1

  • \Users\Admin\saeej.exe

    Filesize

    348KB

    MD5

    6a63fb1f5dae22a672f97cc260e463c5

    SHA1

    eb45b943af83f76dfa94032925817af70ba6178f

    SHA256

    6c1d5e45e777075f7afcff6820d0961f2f9dbc6f86337932b48543b678f2bb86

    SHA512

    6028f95292ab2b0358aa27e3b00c2363a6be12eecd74b400295b23cfe3c0e3bf393afe67ad53ee6e04bb392e9a3c99121f3c96eeb3afcdcf27b56258e5c7a9f1

  • memory/1728-67-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/1728-70-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/1832-56-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/1832-57-0x0000000076401000-0x0000000076403000-memory.dmp

    Filesize

    8KB

  • memory/1832-65-0x0000000002F60000-0x0000000002FB7000-memory.dmp

    Filesize

    348KB

  • memory/1832-66-0x0000000002F60000-0x0000000002FB7000-memory.dmp

    Filesize

    348KB

  • memory/1832-69-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB