Analysis

  • max time kernel
    152s
  • max time network
    84s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 22:34

General

  • Target

    9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe

  • Size

    216KB

  • MD5

    4917f1c841e108c719bb2adcb0e2aff0

  • SHA1

    4015fc97d30750693dc0b3d1c17905ae9c85f3a5

  • SHA256

    9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4

  • SHA512

    32c76446b92d09c93088506dc66de87ec6d01d2e062def89421bde80a007c5b1eddc7e88384fc38c73b38e87d55b548a94924c0c5d699e60c178787ac4fc150c

  • SSDEEP

    6144:GdJZZP5XA+eMIRQwSQ4YH34AAoo070vYN0DQPwkqfS2Qh20K/BG0t7/lG1G8FGr5:1/wVp

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe
    "C:\Users\Admin\AppData\Local\Temp\9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\qiihiov.exe
      "C:\Users\Admin\qiihiov.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1752

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qiihiov.exe

          Filesize

          216KB

          MD5

          ed8c44d328640052d2c302ce84d1a105

          SHA1

          2937b7acc346f360feb7ba5d1a62743471449557

          SHA256

          80dd5187c2d7d3b1ef10d40ce661f62e801bfe3f6f1eeb282ea569089376dfed

          SHA512

          c50644343596681168ab3a948bed7c20ef48e5f13522a94c5feee9b38a2fa4bda6a8922b5d836b5ac95bc93c2cbde5ad0b6131cf26c7fb019d284a3d10a7705c

        • C:\Users\Admin\qiihiov.exe

          Filesize

          216KB

          MD5

          ed8c44d328640052d2c302ce84d1a105

          SHA1

          2937b7acc346f360feb7ba5d1a62743471449557

          SHA256

          80dd5187c2d7d3b1ef10d40ce661f62e801bfe3f6f1eeb282ea569089376dfed

          SHA512

          c50644343596681168ab3a948bed7c20ef48e5f13522a94c5feee9b38a2fa4bda6a8922b5d836b5ac95bc93c2cbde5ad0b6131cf26c7fb019d284a3d10a7705c

        • \Users\Admin\qiihiov.exe

          Filesize

          216KB

          MD5

          ed8c44d328640052d2c302ce84d1a105

          SHA1

          2937b7acc346f360feb7ba5d1a62743471449557

          SHA256

          80dd5187c2d7d3b1ef10d40ce661f62e801bfe3f6f1eeb282ea569089376dfed

          SHA512

          c50644343596681168ab3a948bed7c20ef48e5f13522a94c5feee9b38a2fa4bda6a8922b5d836b5ac95bc93c2cbde5ad0b6131cf26c7fb019d284a3d10a7705c

        • \Users\Admin\qiihiov.exe

          Filesize

          216KB

          MD5

          ed8c44d328640052d2c302ce84d1a105

          SHA1

          2937b7acc346f360feb7ba5d1a62743471449557

          SHA256

          80dd5187c2d7d3b1ef10d40ce661f62e801bfe3f6f1eeb282ea569089376dfed

          SHA512

          c50644343596681168ab3a948bed7c20ef48e5f13522a94c5feee9b38a2fa4bda6a8922b5d836b5ac95bc93c2cbde5ad0b6131cf26c7fb019d284a3d10a7705c

        • memory/1732-56-0x0000000075771000-0x0000000075773000-memory.dmp

          Filesize

          8KB