Analysis

  • max time kernel
    151s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 16:13

General

  • Target

    ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe

  • Size

    172KB

  • MD5

    845ca7719faa6a994e61033737bb8220

  • SHA1

    b1e6bff10daa6d2caa2c88fa8370cb34ccc87568

  • SHA256

    ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0

  • SHA512

    34c6b0d222f0e6a847bf7714236819718c6bacb6c7372a9fe2e78655fbfddd6d1799749cb4211e199ba3186799944ead1460e40c9ab848a437117410dbdb9551

  • SSDEEP

    3072:+j1qlB5QqiwcCA0laletdpVinzswyAQjh/gSF3Ef3ykQoz7C4ly:BIqtc30l+2yzswyAQjh/gSF3Ef3ykQoG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe
    "C:\Users\Admin\AppData\Local\Temp\ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Users\Admin\caoxoc.exe
      "C:\Users\Admin\caoxoc.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\caoxoc.exe

    Filesize

    172KB

    MD5

    2e6e3cae7930795ee126df555dbc2205

    SHA1

    0f122eb5286bfbe6381b27826d3186f414bffcd9

    SHA256

    c488924d2b636c1c58c5f91b052866e7393e0426d195a5bc36119ba8732db79d

    SHA512

    c69232d242658d73b667461f995537bc90eaee5aeefd2ebbdbf9e9e78cb64797c7f1a47f2933f161061721754a9b7c9d7bd8178d557499da055e236929d3a683

  • C:\Users\Admin\caoxoc.exe

    Filesize

    172KB

    MD5

    2e6e3cae7930795ee126df555dbc2205

    SHA1

    0f122eb5286bfbe6381b27826d3186f414bffcd9

    SHA256

    c488924d2b636c1c58c5f91b052866e7393e0426d195a5bc36119ba8732db79d

    SHA512

    c69232d242658d73b667461f995537bc90eaee5aeefd2ebbdbf9e9e78cb64797c7f1a47f2933f161061721754a9b7c9d7bd8178d557499da055e236929d3a683

  • \Users\Admin\caoxoc.exe

    Filesize

    172KB

    MD5

    2e6e3cae7930795ee126df555dbc2205

    SHA1

    0f122eb5286bfbe6381b27826d3186f414bffcd9

    SHA256

    c488924d2b636c1c58c5f91b052866e7393e0426d195a5bc36119ba8732db79d

    SHA512

    c69232d242658d73b667461f995537bc90eaee5aeefd2ebbdbf9e9e78cb64797c7f1a47f2933f161061721754a9b7c9d7bd8178d557499da055e236929d3a683

  • \Users\Admin\caoxoc.exe

    Filesize

    172KB

    MD5

    2e6e3cae7930795ee126df555dbc2205

    SHA1

    0f122eb5286bfbe6381b27826d3186f414bffcd9

    SHA256

    c488924d2b636c1c58c5f91b052866e7393e0426d195a5bc36119ba8732db79d

    SHA512

    c69232d242658d73b667461f995537bc90eaee5aeefd2ebbdbf9e9e78cb64797c7f1a47f2933f161061721754a9b7c9d7bd8178d557499da055e236929d3a683

  • memory/832-56-0x0000000075921000-0x0000000075923000-memory.dmp

    Filesize

    8KB

  • memory/900-59-0x0000000000000000-mapping.dmp