Analysis

  • max time kernel
    187s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 01:50

General

  • Target

    4e0e75084a920a50ade973e6b9b9eb2418fe2d04f896899c532257f18a97feb2.exe

  • Size

    172KB

  • MD5

    577a2cb053dadf834513ae43412625cd

  • SHA1

    45cdfac0286ca52d7080591a723ad084ce8df46c

  • SHA256

    4e0e75084a920a50ade973e6b9b9eb2418fe2d04f896899c532257f18a97feb2

  • SHA512

    b6c0a4b6ebf250de009aabc616d6eb3c761a427842ba2076d92904f9bebda4c82a142fe85e572c0a2f78b9c64d389dd25c96a4ac62c328db1b00ef6f3afe06cb

  • SSDEEP

    3072:udHhyS9l5ep9Chu7Gbwhd5eEQMSZdSkxiAPbmWU09LjLS:efepqu7CwteASZdBxPbPpg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e0e75084a920a50ade973e6b9b9eb2418fe2d04f896899c532257f18a97feb2.exe
    "C:\Users\Admin\AppData\Local\Temp\4e0e75084a920a50ade973e6b9b9eb2418fe2d04f896899c532257f18a97feb2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\deumoc.exe
      "C:\Users\Admin\deumoc.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\deumoc.exe

    Filesize

    172KB

    MD5

    64848a03fcbab59fb1702777df3685ea

    SHA1

    ba48965af8ea9f8f4b5b047f08d3d85f9deb6887

    SHA256

    aa1b1321fbc8dd58c028cb8740c09dc72974502f728a3240d1a67cffc0574965

    SHA512

    d47dd5dc3f2513ba42b553e82b0613bb37b03663d20d0667d5ad7a4ef43513ff520571cea752836da9cc5cfddee1f184e88da6386a25cfc3e8210e775c603ff3

  • C:\Users\Admin\deumoc.exe

    Filesize

    172KB

    MD5

    64848a03fcbab59fb1702777df3685ea

    SHA1

    ba48965af8ea9f8f4b5b047f08d3d85f9deb6887

    SHA256

    aa1b1321fbc8dd58c028cb8740c09dc72974502f728a3240d1a67cffc0574965

    SHA512

    d47dd5dc3f2513ba42b553e82b0613bb37b03663d20d0667d5ad7a4ef43513ff520571cea752836da9cc5cfddee1f184e88da6386a25cfc3e8210e775c603ff3

  • \Users\Admin\deumoc.exe

    Filesize

    172KB

    MD5

    64848a03fcbab59fb1702777df3685ea

    SHA1

    ba48965af8ea9f8f4b5b047f08d3d85f9deb6887

    SHA256

    aa1b1321fbc8dd58c028cb8740c09dc72974502f728a3240d1a67cffc0574965

    SHA512

    d47dd5dc3f2513ba42b553e82b0613bb37b03663d20d0667d5ad7a4ef43513ff520571cea752836da9cc5cfddee1f184e88da6386a25cfc3e8210e775c603ff3

  • \Users\Admin\deumoc.exe

    Filesize

    172KB

    MD5

    64848a03fcbab59fb1702777df3685ea

    SHA1

    ba48965af8ea9f8f4b5b047f08d3d85f9deb6887

    SHA256

    aa1b1321fbc8dd58c028cb8740c09dc72974502f728a3240d1a67cffc0574965

    SHA512

    d47dd5dc3f2513ba42b553e82b0613bb37b03663d20d0667d5ad7a4ef43513ff520571cea752836da9cc5cfddee1f184e88da6386a25cfc3e8210e775c603ff3

  • memory/1880-56-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

    Filesize

    8KB