Analysis

  • max time kernel
    150s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2022 03:46

General

  • Target

    577cc571f5ca8f1125dcacd9110f4e7da90e881d469533740943438fe256334f.exe

  • Size

    156KB

  • MD5

    70cc302775a0be9657249afebecdaed0

  • SHA1

    67b4538de25649f6788af8ff48a6bde5fbec7fe4

  • SHA256

    577cc571f5ca8f1125dcacd9110f4e7da90e881d469533740943438fe256334f

  • SHA512

    a51fc3f373f5f57bde7d522c824d7d73cb2d8f7b78b27a65e18e80fe18334d27a35e40f55c5096362d6cca6c79ec81981a20236e0ebf3e1d205253a08f96c326

  • SSDEEP

    3072:VKzwSpGbGb6JUBGnvZHpXtNLdZkkVYaZvLStH/h7yc2dK2E5j4oQlR:w8jbGb6JaGnvZZtNLdZkRapLmH8c2dCd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\577cc571f5ca8f1125dcacd9110f4e7da90e881d469533740943438fe256334f.exe
    "C:\Users\Admin\AppData\Local\Temp\577cc571f5ca8f1125dcacd9110f4e7da90e881d469533740943438fe256334f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\hiuep.exe
      "C:\Users\Admin\hiuep.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hiuep.exe

    Filesize

    156KB

    MD5

    f0514e80d147d7011f2529fd3c358169

    SHA1

    4da666d27fa74b275e64de16ef15bf0b3740f8b8

    SHA256

    e14b2bba65b607690636cd608556f99eaf6ad6522c0e5b599adec3021b805872

    SHA512

    617c903e2a420c7059f3f1d5a837cfccea292320920b6d58ef0341a3af384679f1108e1589f8e6f788f653588f9bba06adfb224a638500f8f5564aef079d5635

  • C:\Users\Admin\hiuep.exe

    Filesize

    156KB

    MD5

    f0514e80d147d7011f2529fd3c358169

    SHA1

    4da666d27fa74b275e64de16ef15bf0b3740f8b8

    SHA256

    e14b2bba65b607690636cd608556f99eaf6ad6522c0e5b599adec3021b805872

    SHA512

    617c903e2a420c7059f3f1d5a837cfccea292320920b6d58ef0341a3af384679f1108e1589f8e6f788f653588f9bba06adfb224a638500f8f5564aef079d5635

  • \Users\Admin\hiuep.exe

    Filesize

    156KB

    MD5

    f0514e80d147d7011f2529fd3c358169

    SHA1

    4da666d27fa74b275e64de16ef15bf0b3740f8b8

    SHA256

    e14b2bba65b607690636cd608556f99eaf6ad6522c0e5b599adec3021b805872

    SHA512

    617c903e2a420c7059f3f1d5a837cfccea292320920b6d58ef0341a3af384679f1108e1589f8e6f788f653588f9bba06adfb224a638500f8f5564aef079d5635

  • \Users\Admin\hiuep.exe

    Filesize

    156KB

    MD5

    f0514e80d147d7011f2529fd3c358169

    SHA1

    4da666d27fa74b275e64de16ef15bf0b3740f8b8

    SHA256

    e14b2bba65b607690636cd608556f99eaf6ad6522c0e5b599adec3021b805872

    SHA512

    617c903e2a420c7059f3f1d5a837cfccea292320920b6d58ef0341a3af384679f1108e1589f8e6f788f653588f9bba06adfb224a638500f8f5564aef079d5635

  • memory/1544-56-0x0000000075681000-0x0000000075683000-memory.dmp

    Filesize

    8KB