Analysis

  • max time kernel
    151s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 00:15

General

  • Target

    951d138339cdfc1d0a4f7f512b60422dec13bfe2fcc8bf792708608d9855b209.exe

  • Size

    156KB

  • MD5

    92d3ff1eaf6a2d29a2ad25e94d639c60

  • SHA1

    1a6a3e4884743768b7d3aa88c94b4e44205a752b

  • SHA256

    951d138339cdfc1d0a4f7f512b60422dec13bfe2fcc8bf792708608d9855b209

  • SHA512

    b39e22d8962027883211290f7fbd3c86087db56d06b85b6e9b36b95a4f960b1f4eed412412dfe90a7c91bfd8f7b8038211d9bb46ae4c9664824f19bdc81e443f

  • SSDEEP

    3072:A8VmcOK9IOJeC+3Ip4CFbgjZnJygNqHVbwvVTSIs04oQZiEr5:1VmJK9psIp44bgjZzwVoT2QWz

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\951d138339cdfc1d0a4f7f512b60422dec13bfe2fcc8bf792708608d9855b209.exe
    "C:\Users\Admin\AppData\Local\Temp\951d138339cdfc1d0a4f7f512b60422dec13bfe2fcc8bf792708608d9855b209.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\goesu.exe
      "C:\Users\Admin\goesu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\goesu.exe

    Filesize

    156KB

    MD5

    9bdfbfad8c2d74f3eb2a0243266f2d75

    SHA1

    8a23ae8ac5c23d0d162aa1c973fac5d915640890

    SHA256

    a956390107d11be446be4b3e226be3f4fa6dade5d56ef423dc2e82dfbfd5bcce

    SHA512

    5de99d02d121ac193b3a67abe50f4a00468336b4fc492df5e9df5c2e1fc3f2a5d6d8608930c628ef6ad5ec48a92943e133efcf9769e7993c11b6312f7644a8dc

  • C:\Users\Admin\goesu.exe

    Filesize

    156KB

    MD5

    9bdfbfad8c2d74f3eb2a0243266f2d75

    SHA1

    8a23ae8ac5c23d0d162aa1c973fac5d915640890

    SHA256

    a956390107d11be446be4b3e226be3f4fa6dade5d56ef423dc2e82dfbfd5bcce

    SHA512

    5de99d02d121ac193b3a67abe50f4a00468336b4fc492df5e9df5c2e1fc3f2a5d6d8608930c628ef6ad5ec48a92943e133efcf9769e7993c11b6312f7644a8dc

  • \Users\Admin\goesu.exe

    Filesize

    156KB

    MD5

    9bdfbfad8c2d74f3eb2a0243266f2d75

    SHA1

    8a23ae8ac5c23d0d162aa1c973fac5d915640890

    SHA256

    a956390107d11be446be4b3e226be3f4fa6dade5d56ef423dc2e82dfbfd5bcce

    SHA512

    5de99d02d121ac193b3a67abe50f4a00468336b4fc492df5e9df5c2e1fc3f2a5d6d8608930c628ef6ad5ec48a92943e133efcf9769e7993c11b6312f7644a8dc

  • \Users\Admin\goesu.exe

    Filesize

    156KB

    MD5

    9bdfbfad8c2d74f3eb2a0243266f2d75

    SHA1

    8a23ae8ac5c23d0d162aa1c973fac5d915640890

    SHA256

    a956390107d11be446be4b3e226be3f4fa6dade5d56ef423dc2e82dfbfd5bcce

    SHA512

    5de99d02d121ac193b3a67abe50f4a00468336b4fc492df5e9df5c2e1fc3f2a5d6d8608930c628ef6ad5ec48a92943e133efcf9769e7993c11b6312f7644a8dc

  • memory/844-59-0x0000000000000000-mapping.dmp

  • memory/1348-56-0x0000000074F41000-0x0000000074F43000-memory.dmp

    Filesize

    8KB