Analysis

  • max time kernel
    151s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 01:57

General

  • Target

    34eceb3fcde2a50b7715b79daa06f433bb8794409d9389c1908108d90f65fb58.exe

  • Size

    184KB

  • MD5

    811d1efdadc510bdc1145547569552db

  • SHA1

    14e2c6ef5595a2b49e922ad11b29d4988ac67133

  • SHA256

    34eceb3fcde2a50b7715b79daa06f433bb8794409d9389c1908108d90f65fb58

  • SHA512

    686a9caba66fa85f6652680aa1c9bc2463dc5553d6e019d682bc0f2c40c6d7bebcfe7c250423620bfa8327d15f2d48e808f6324f9cd4e5c9f2ed466c3733eca2

  • SSDEEP

    3072:ZI55BzN9YUdtG716ennADVeMfcRAGKB+uMTEd1CTa:ZiZu1tnADVhERAGKB+uSEdl

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34eceb3fcde2a50b7715b79daa06f433bb8794409d9389c1908108d90f65fb58.exe
    "C:\Users\Admin\AppData\Local\Temp\34eceb3fcde2a50b7715b79daa06f433bb8794409d9389c1908108d90f65fb58.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Users\Admin\tlket.exe
      "C:\Users\Admin\tlket.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1512

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tlket.exe

    Filesize

    184KB

    MD5

    d3dee7699bf1173439f9fd08995cd3f3

    SHA1

    096fafe809fdf0bc897b743661c158935ff221c2

    SHA256

    7d4a5bbfd0dc43bc48c2151030ec7e89746f1bfe4c384b79ca2714af04e25002

    SHA512

    bbd8d6dca7ec37f292d7960c9ad0013ae80170bfbc0b7484f1dbcd802bcb7e19e9965d7e705caa129c981c2752052f1cc398268e3ea7aae29b458d385aaf1593

  • C:\Users\Admin\tlket.exe

    Filesize

    184KB

    MD5

    d3dee7699bf1173439f9fd08995cd3f3

    SHA1

    096fafe809fdf0bc897b743661c158935ff221c2

    SHA256

    7d4a5bbfd0dc43bc48c2151030ec7e89746f1bfe4c384b79ca2714af04e25002

    SHA512

    bbd8d6dca7ec37f292d7960c9ad0013ae80170bfbc0b7484f1dbcd802bcb7e19e9965d7e705caa129c981c2752052f1cc398268e3ea7aae29b458d385aaf1593

  • \Users\Admin\tlket.exe

    Filesize

    184KB

    MD5

    d3dee7699bf1173439f9fd08995cd3f3

    SHA1

    096fafe809fdf0bc897b743661c158935ff221c2

    SHA256

    7d4a5bbfd0dc43bc48c2151030ec7e89746f1bfe4c384b79ca2714af04e25002

    SHA512

    bbd8d6dca7ec37f292d7960c9ad0013ae80170bfbc0b7484f1dbcd802bcb7e19e9965d7e705caa129c981c2752052f1cc398268e3ea7aae29b458d385aaf1593

  • \Users\Admin\tlket.exe

    Filesize

    184KB

    MD5

    d3dee7699bf1173439f9fd08995cd3f3

    SHA1

    096fafe809fdf0bc897b743661c158935ff221c2

    SHA256

    7d4a5bbfd0dc43bc48c2151030ec7e89746f1bfe4c384b79ca2714af04e25002

    SHA512

    bbd8d6dca7ec37f292d7960c9ad0013ae80170bfbc0b7484f1dbcd802bcb7e19e9965d7e705caa129c981c2752052f1cc398268e3ea7aae29b458d385aaf1593

  • memory/548-56-0x0000000076171000-0x0000000076173000-memory.dmp

    Filesize

    8KB

  • memory/1512-59-0x0000000000000000-mapping.dmp