Analysis

  • max time kernel
    152s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 01:43

General

  • Target

    24c2b36727952a6b867323aacf775479b95cd659c8786d96bdc4cf75119f70c6.exe

  • Size

    300KB

  • MD5

    575b86853af61d09cd600bb421875720

  • SHA1

    b4cf2f0e9df4159accf9e6a49b456591c384cb25

  • SHA256

    24c2b36727952a6b867323aacf775479b95cd659c8786d96bdc4cf75119f70c6

  • SHA512

    2cc56a92c2ac71ce5ec941da934bdcc5b94f5cdbe3ac06cebd137fdac750930d39b4f2ea30c49ebb5e72d72b9f1f8424eccf36cc43a961720f3e049b3e663fa2

  • SSDEEP

    6144:X5dCMeavuzakX681UbgwDO7zRdmM57M186AFG9:XvBvuzzE9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24c2b36727952a6b867323aacf775479b95cd659c8786d96bdc4cf75119f70c6.exe
    "C:\Users\Admin\AppData\Local\Temp\24c2b36727952a6b867323aacf775479b95cd659c8786d96bdc4cf75119f70c6.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\feixeb.exe
      "C:\Users\Admin\feixeb.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:944

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\feixeb.exe

          Filesize

          300KB

          MD5

          92d5b1625a6bb45df631b3e442f96c38

          SHA1

          ac23aee383e9df8cad69ff1b975f81d31cbf9c4a

          SHA256

          4cf700642e81a65cf28533c27726b16e42d6885b487bfd62ac65701161786233

          SHA512

          851780ed0ed23944cfc785d031348f3a8ee133e2b207229a0fa4b142c00cbf0e3a53b59fc484cd1e4fddb765f3d25475db1584d557b77111a8b75d9c67ca9577

        • C:\Users\Admin\feixeb.exe

          Filesize

          300KB

          MD5

          92d5b1625a6bb45df631b3e442f96c38

          SHA1

          ac23aee383e9df8cad69ff1b975f81d31cbf9c4a

          SHA256

          4cf700642e81a65cf28533c27726b16e42d6885b487bfd62ac65701161786233

          SHA512

          851780ed0ed23944cfc785d031348f3a8ee133e2b207229a0fa4b142c00cbf0e3a53b59fc484cd1e4fddb765f3d25475db1584d557b77111a8b75d9c67ca9577

        • \Users\Admin\feixeb.exe

          Filesize

          300KB

          MD5

          92d5b1625a6bb45df631b3e442f96c38

          SHA1

          ac23aee383e9df8cad69ff1b975f81d31cbf9c4a

          SHA256

          4cf700642e81a65cf28533c27726b16e42d6885b487bfd62ac65701161786233

          SHA512

          851780ed0ed23944cfc785d031348f3a8ee133e2b207229a0fa4b142c00cbf0e3a53b59fc484cd1e4fddb765f3d25475db1584d557b77111a8b75d9c67ca9577

        • \Users\Admin\feixeb.exe

          Filesize

          300KB

          MD5

          92d5b1625a6bb45df631b3e442f96c38

          SHA1

          ac23aee383e9df8cad69ff1b975f81d31cbf9c4a

          SHA256

          4cf700642e81a65cf28533c27726b16e42d6885b487bfd62ac65701161786233

          SHA512

          851780ed0ed23944cfc785d031348f3a8ee133e2b207229a0fa4b142c00cbf0e3a53b59fc484cd1e4fddb765f3d25475db1584d557b77111a8b75d9c67ca9577

        • memory/1644-56-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

          Filesize

          8KB