Analysis

  • max time kernel
    150s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 18:25

General

  • Target

    c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe

  • Size

    224KB

  • MD5

    0128cf936a8b37c874548a7e74798830

  • SHA1

    43d4e494b6731b420b03a497b201c78f395f62d3

  • SHA256

    c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b

  • SHA512

    44aed777e3da471ee789326bf9da584c6c1bd1b5921c9670b443febc8939da7c3b75e62c55de87b7f5c0e80ad48fac0756e1a5fd3c0b60c532bf776b653b5de3

  • SSDEEP

    3072:NXyqNsMoBuMZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax2+l:0qN5Yp4LnbmlrZ3y

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe
    "C:\Users\Admin\AppData\Local\Temp\c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\sauic.exe
      "C:\Users\Admin\sauic.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1144

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\sauic.exe

          Filesize

          224KB

          MD5

          213575d32e80267e0520666090464622

          SHA1

          f9d4d9d191844579bd28551fe7cc9203aa2c4518

          SHA256

          925c607905f1bdd0eb5e1ac073c0f4e7070d7d7f85398afa3f7870f6f18e95c4

          SHA512

          5e7f9a4acb25083b9ba571742116102da4ff940866da943397cb06a6c427c46cf5ed1d0e4dd6968ce075d0c6e42b7b5e7aa7a917c37b71ccde30bc6fbca66937

        • C:\Users\Admin\sauic.exe

          Filesize

          224KB

          MD5

          213575d32e80267e0520666090464622

          SHA1

          f9d4d9d191844579bd28551fe7cc9203aa2c4518

          SHA256

          925c607905f1bdd0eb5e1ac073c0f4e7070d7d7f85398afa3f7870f6f18e95c4

          SHA512

          5e7f9a4acb25083b9ba571742116102da4ff940866da943397cb06a6c427c46cf5ed1d0e4dd6968ce075d0c6e42b7b5e7aa7a917c37b71ccde30bc6fbca66937

        • \Users\Admin\sauic.exe

          Filesize

          224KB

          MD5

          213575d32e80267e0520666090464622

          SHA1

          f9d4d9d191844579bd28551fe7cc9203aa2c4518

          SHA256

          925c607905f1bdd0eb5e1ac073c0f4e7070d7d7f85398afa3f7870f6f18e95c4

          SHA512

          5e7f9a4acb25083b9ba571742116102da4ff940866da943397cb06a6c427c46cf5ed1d0e4dd6968ce075d0c6e42b7b5e7aa7a917c37b71ccde30bc6fbca66937

        • \Users\Admin\sauic.exe

          Filesize

          224KB

          MD5

          213575d32e80267e0520666090464622

          SHA1

          f9d4d9d191844579bd28551fe7cc9203aa2c4518

          SHA256

          925c607905f1bdd0eb5e1ac073c0f4e7070d7d7f85398afa3f7870f6f18e95c4

          SHA512

          5e7f9a4acb25083b9ba571742116102da4ff940866da943397cb06a6c427c46cf5ed1d0e4dd6968ce075d0c6e42b7b5e7aa7a917c37b71ccde30bc6fbca66937

        • memory/1928-56-0x00000000762B1000-0x00000000762B3000-memory.dmp

          Filesize

          8KB