Analysis

  • max time kernel
    150s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 10:18

General

  • Target

    8a6f2d7f933d0b69d4c1e2c0048d3e3465f34349c427bcc9ade813661bd9d22a.exe

  • Size

    224KB

  • MD5

    7aea1a14d1b2eda0858ba58484dddd10

  • SHA1

    e3712cbae9d5d855bb879952990226df01da9658

  • SHA256

    8a6f2d7f933d0b69d4c1e2c0048d3e3465f34349c427bcc9ade813661bd9d22a

  • SHA512

    ceca0d6ab74b92c31603fa2b4fba214bed73d573947f84c5d6ba30a4c260f69200fc34ebde34d03bf574726ce6c281a7228937f64e93fead1b326c80b9d86d76

  • SSDEEP

    6144:tUqO83FrSU0bIaX/m7bfTWaJPGeyb7qh7wNAZBbM3f1jG:tUqO8RSU0bIaX/m7bfTWaV1wWZBbM3fg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a6f2d7f933d0b69d4c1e2c0048d3e3465f34349c427bcc9ade813661bd9d22a.exe
    "C:\Users\Admin\AppData\Local\Temp\8a6f2d7f933d0b69d4c1e2c0048d3e3465f34349c427bcc9ade813661bd9d22a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Users\Admin\gmgax.exe
      "C:\Users\Admin\gmgax.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:916

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\gmgax.exe

          Filesize

          224KB

          MD5

          d29faf2aedcf54602efe2c739e941783

          SHA1

          74da5fb1d36a9d01553e77874aac622d484b96e6

          SHA256

          755e468f5e61139fa0709bc718c60694736ec282c7706f779bc77fa4a117a1bb

          SHA512

          8a7c8d49ca2202e361e9fef3fbf68ef5dbb9a9cab9aad0c85afc64de079290bd3e9e1b636dd3e8f99640528c6be2fbd0c830c8ab6acf1ec55335fe38890f6914

        • C:\Users\Admin\gmgax.exe

          Filesize

          224KB

          MD5

          d29faf2aedcf54602efe2c739e941783

          SHA1

          74da5fb1d36a9d01553e77874aac622d484b96e6

          SHA256

          755e468f5e61139fa0709bc718c60694736ec282c7706f779bc77fa4a117a1bb

          SHA512

          8a7c8d49ca2202e361e9fef3fbf68ef5dbb9a9cab9aad0c85afc64de079290bd3e9e1b636dd3e8f99640528c6be2fbd0c830c8ab6acf1ec55335fe38890f6914

        • \Users\Admin\gmgax.exe

          Filesize

          224KB

          MD5

          d29faf2aedcf54602efe2c739e941783

          SHA1

          74da5fb1d36a9d01553e77874aac622d484b96e6

          SHA256

          755e468f5e61139fa0709bc718c60694736ec282c7706f779bc77fa4a117a1bb

          SHA512

          8a7c8d49ca2202e361e9fef3fbf68ef5dbb9a9cab9aad0c85afc64de079290bd3e9e1b636dd3e8f99640528c6be2fbd0c830c8ab6acf1ec55335fe38890f6914

        • \Users\Admin\gmgax.exe

          Filesize

          224KB

          MD5

          d29faf2aedcf54602efe2c739e941783

          SHA1

          74da5fb1d36a9d01553e77874aac622d484b96e6

          SHA256

          755e468f5e61139fa0709bc718c60694736ec282c7706f779bc77fa4a117a1bb

          SHA512

          8a7c8d49ca2202e361e9fef3fbf68ef5dbb9a9cab9aad0c85afc64de079290bd3e9e1b636dd3e8f99640528c6be2fbd0c830c8ab6acf1ec55335fe38890f6914

        • memory/816-56-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

          Filesize

          8KB