Analysis

  • max time kernel
    227s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 12:09

General

  • Target

    668e3f57f2fd42244c89c2206b0e410f6cf0fc602f6803f942ea96fd79569822.exe

  • Size

    68KB

  • MD5

    7381a00ce6ef90c8660015460c00db6e

  • SHA1

    8d482482c1b5025f90af1887d581f554b96d6c2d

  • SHA256

    668e3f57f2fd42244c89c2206b0e410f6cf0fc602f6803f942ea96fd79569822

  • SHA512

    1ad5715c9b6a74eea806c3239149bd56b4a695439ce4e22c646a2bc1f5d534bf2bb0349f89de56e741eedbda1bd26d577dfe373af94cc6757ae8b6159d0167bb

  • SSDEEP

    768:8cYliTde+Al+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:bYIxJAcqOK3qowgnt1d

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\668e3f57f2fd42244c89c2206b0e410f6cf0fc602f6803f942ea96fd79569822.exe
    "C:\Users\Admin\AppData\Local\Temp\668e3f57f2fd42244c89c2206b0e410f6cf0fc602f6803f942ea96fd79569822.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\Admin.exe
      "C:\Users\Admin\Admin.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Admin.exe

    Filesize

    68KB

    MD5

    b88521ee9ebe4a0951ab84e141ebd166

    SHA1

    e55572a96f90b5b79791d755e95c0f03cb7ffaa3

    SHA256

    674f6bc9906d86bc25d24a7b6ebc82dc76df2e1684db216b46714e28b396b955

    SHA512

    896e958f88275b56a55d2bb39e759c22ea8afc198d47306e712edd4738a0fb56776f1c9adb79c51b5475fd78109784ac6b7eb1c206da4995029f27034387180b

  • \Users\Admin\Admin.exe

    Filesize

    68KB

    MD5

    b88521ee9ebe4a0951ab84e141ebd166

    SHA1

    e55572a96f90b5b79791d755e95c0f03cb7ffaa3

    SHA256

    674f6bc9906d86bc25d24a7b6ebc82dc76df2e1684db216b46714e28b396b955

    SHA512

    896e958f88275b56a55d2bb39e759c22ea8afc198d47306e712edd4738a0fb56776f1c9adb79c51b5475fd78109784ac6b7eb1c206da4995029f27034387180b

  • \Users\Admin\Admin.exe

    Filesize

    68KB

    MD5

    b88521ee9ebe4a0951ab84e141ebd166

    SHA1

    e55572a96f90b5b79791d755e95c0f03cb7ffaa3

    SHA256

    674f6bc9906d86bc25d24a7b6ebc82dc76df2e1684db216b46714e28b396b955

    SHA512

    896e958f88275b56a55d2bb39e759c22ea8afc198d47306e712edd4738a0fb56776f1c9adb79c51b5475fd78109784ac6b7eb1c206da4995029f27034387180b

  • memory/1976-62-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2044-54-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2044-57-0x00000000753C1000-0x00000000753C3000-memory.dmp

    Filesize

    8KB