Analysis

  • max time kernel
    152s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 16:24

General

  • Target

    bed01b28a9fc50ca04a93dc34fbf8dce685fd9d3ab2d4ab6bf5eaac3ee875067.exe

  • Size

    228KB

  • MD5

    a37d043cd7bf16bb3fe436e49ba909fb

  • SHA1

    e34b3b3425c1cc60dbc9c7054f072597d8547fd9

  • SHA256

    bed01b28a9fc50ca04a93dc34fbf8dce685fd9d3ab2d4ab6bf5eaac3ee875067

  • SHA512

    1f684132ea41baf4c8df153c90eb652102f545b9405894b62d128f97663c395125c978746bf989e12466d023e10198a3cfc1afd02086e0adeb04dbff2502c69e

  • SSDEEP

    3072:ugnEui5UYJVFV5eDQHsuvNA05Vqtto24VmcZMUuXi46qndeAxIbYpZB:+d3JrLeDQHr+uV0to24VmlUuSvqEo

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bed01b28a9fc50ca04a93dc34fbf8dce685fd9d3ab2d4ab6bf5eaac3ee875067.exe
    "C:\Users\Admin\AppData\Local\Temp\bed01b28a9fc50ca04a93dc34fbf8dce685fd9d3ab2d4ab6bf5eaac3ee875067.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\hiekail.exe
      "C:\Users\Admin\hiekail.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:588

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\hiekail.exe

          Filesize

          228KB

          MD5

          d815165d1314d35712d36a56beea2c10

          SHA1

          f3929d6e1f253ee90ff68c425afc21be32869b79

          SHA256

          87cf56d39d7432b15e3af637dfa986d8f4f77f072078f1924529373745bc89fd

          SHA512

          ea8f157a78ecf1ce145d44e5339be4688ca59cc2a9d0e12b60d99d6fbdc192ef0fe4ef42ba18811b80ee1424c138fb6d4e6092abee4263f87b0ac85facd366f0

        • C:\Users\Admin\hiekail.exe

          Filesize

          228KB

          MD5

          d815165d1314d35712d36a56beea2c10

          SHA1

          f3929d6e1f253ee90ff68c425afc21be32869b79

          SHA256

          87cf56d39d7432b15e3af637dfa986d8f4f77f072078f1924529373745bc89fd

          SHA512

          ea8f157a78ecf1ce145d44e5339be4688ca59cc2a9d0e12b60d99d6fbdc192ef0fe4ef42ba18811b80ee1424c138fb6d4e6092abee4263f87b0ac85facd366f0

        • \Users\Admin\hiekail.exe

          Filesize

          228KB

          MD5

          d815165d1314d35712d36a56beea2c10

          SHA1

          f3929d6e1f253ee90ff68c425afc21be32869b79

          SHA256

          87cf56d39d7432b15e3af637dfa986d8f4f77f072078f1924529373745bc89fd

          SHA512

          ea8f157a78ecf1ce145d44e5339be4688ca59cc2a9d0e12b60d99d6fbdc192ef0fe4ef42ba18811b80ee1424c138fb6d4e6092abee4263f87b0ac85facd366f0

        • \Users\Admin\hiekail.exe

          Filesize

          228KB

          MD5

          d815165d1314d35712d36a56beea2c10

          SHA1

          f3929d6e1f253ee90ff68c425afc21be32869b79

          SHA256

          87cf56d39d7432b15e3af637dfa986d8f4f77f072078f1924529373745bc89fd

          SHA512

          ea8f157a78ecf1ce145d44e5339be4688ca59cc2a9d0e12b60d99d6fbdc192ef0fe4ef42ba18811b80ee1424c138fb6d4e6092abee4263f87b0ac85facd366f0

        • memory/1220-56-0x0000000074D81000-0x0000000074D83000-memory.dmp

          Filesize

          8KB