Analysis

  • max time kernel
    152s
  • max time network
    95s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 22:41

General

  • Target

    b1553875800004384ad9d6870f086ed483c8986855c5de1ac034d241ba222206.exe

  • Size

    252KB

  • MD5

    7470da3929046fafcd7cae5ed5b53d27

  • SHA1

    c9d3e6cbb9459b59b19fd7674ea3015afc5eedd1

  • SHA256

    b1553875800004384ad9d6870f086ed483c8986855c5de1ac034d241ba222206

  • SHA512

    c56aa2bd9d335c00efbac583ee4073112f637df36dba055b5d61dc3e57ace030467dcbd56e8847c04253ee6c4884e80a4214990d35c117e1341684e402518e69

  • SSDEEP

    3072:lrAcTx7LaXsWvZ0OgRqTAJcLGGO/xuiEyJeOOeGs5oxnkNzQKHT0:lrwFx/ZLA4PmG6d

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1553875800004384ad9d6870f086ed483c8986855c5de1ac034d241ba222206.exe
    "C:\Users\Admin\AppData\Local\Temp\b1553875800004384ad9d6870f086ed483c8986855c5de1ac034d241ba222206.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\cpcaev.exe
      "C:\Users\Admin\cpcaev.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\cpcaev.exe

    Filesize

    252KB

    MD5

    fbbf7d07b455612517c77d9a4e329a84

    SHA1

    8e5cb63df5d38a3647a251a63544129cf249d94e

    SHA256

    d259c8c75bd60147bb45858e6910c82e7f9869507b66566678aa1bc4900e1080

    SHA512

    963a7c509bcf1148f5bd38f733057c1cc4bcd8dc0c2f137ebf0667dbc32943a00121700e18a6a7be76e8650e26f628b898d7e1b6e6945f623334572fd905e95e

  • C:\Users\Admin\cpcaev.exe

    Filesize

    252KB

    MD5

    fbbf7d07b455612517c77d9a4e329a84

    SHA1

    8e5cb63df5d38a3647a251a63544129cf249d94e

    SHA256

    d259c8c75bd60147bb45858e6910c82e7f9869507b66566678aa1bc4900e1080

    SHA512

    963a7c509bcf1148f5bd38f733057c1cc4bcd8dc0c2f137ebf0667dbc32943a00121700e18a6a7be76e8650e26f628b898d7e1b6e6945f623334572fd905e95e

  • \Users\Admin\cpcaev.exe

    Filesize

    252KB

    MD5

    fbbf7d07b455612517c77d9a4e329a84

    SHA1

    8e5cb63df5d38a3647a251a63544129cf249d94e

    SHA256

    d259c8c75bd60147bb45858e6910c82e7f9869507b66566678aa1bc4900e1080

    SHA512

    963a7c509bcf1148f5bd38f733057c1cc4bcd8dc0c2f137ebf0667dbc32943a00121700e18a6a7be76e8650e26f628b898d7e1b6e6945f623334572fd905e95e

  • \Users\Admin\cpcaev.exe

    Filesize

    252KB

    MD5

    fbbf7d07b455612517c77d9a4e329a84

    SHA1

    8e5cb63df5d38a3647a251a63544129cf249d94e

    SHA256

    d259c8c75bd60147bb45858e6910c82e7f9869507b66566678aa1bc4900e1080

    SHA512

    963a7c509bcf1148f5bd38f733057c1cc4bcd8dc0c2f137ebf0667dbc32943a00121700e18a6a7be76e8650e26f628b898d7e1b6e6945f623334572fd905e95e

  • memory/1368-56-0x0000000075C51000-0x0000000075C53000-memory.dmp

    Filesize

    8KB

  • memory/1652-59-0x0000000000000000-mapping.dmp