Analysis

  • max time kernel
    150s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 00:23

General

  • Target

    e4221a3670c63dacb51d4278e0deb9d215de8a2bf75a4eebf80e6f88812d2791.exe

  • Size

    104KB

  • MD5

    a32df0fa8ac7be1e0480ad2add916c60

  • SHA1

    0fd2528ed651332c52cd26e643920785a68ffb94

  • SHA256

    e4221a3670c63dacb51d4278e0deb9d215de8a2bf75a4eebf80e6f88812d2791

  • SHA512

    a73893383cc76bad052ad3adce92543a4516afc509305ea60004774cdb1903c4dccc3ac786a8040e14ac50da8c52dcf15e00dc60e4a0cd7f03780334d91d6e8c

  • SSDEEP

    1536:b1shvr9f8ieh6hC3KwTHlyHcw1rqVjSxakAyBGGcJ5J9r:GhTlZehWwTHlyHBQNSxWJ9r

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4221a3670c63dacb51d4278e0deb9d215de8a2bf75a4eebf80e6f88812d2791.exe
    "C:\Users\Admin\AppData\Local\Temp\e4221a3670c63dacb51d4278e0deb9d215de8a2bf75a4eebf80e6f88812d2791.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Users\Admin\bouuq.exe
      "C:\Users\Admin\bouuq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\bouuq.exe

    Filesize

    104KB

    MD5

    50b1bbbd3bba959ce3f489998d9771e9

    SHA1

    a35a1a37991d1f305af2ba2fff28c49bab32de8a

    SHA256

    22a472092ff2988c88b1720173bbc119475ca5d5476022556325fa510d18e97c

    SHA512

    b6cd94c9323632dd7b167ac79d2eed8e88fa3e066110ebb079f2a4adc1fb255f79d2a653f602bc0359992daef4f795f31ebffeb178388dd38b3b0a066efdcf7f

  • C:\Users\Admin\bouuq.exe

    Filesize

    104KB

    MD5

    50b1bbbd3bba959ce3f489998d9771e9

    SHA1

    a35a1a37991d1f305af2ba2fff28c49bab32de8a

    SHA256

    22a472092ff2988c88b1720173bbc119475ca5d5476022556325fa510d18e97c

    SHA512

    b6cd94c9323632dd7b167ac79d2eed8e88fa3e066110ebb079f2a4adc1fb255f79d2a653f602bc0359992daef4f795f31ebffeb178388dd38b3b0a066efdcf7f

  • \Users\Admin\bouuq.exe

    Filesize

    104KB

    MD5

    50b1bbbd3bba959ce3f489998d9771e9

    SHA1

    a35a1a37991d1f305af2ba2fff28c49bab32de8a

    SHA256

    22a472092ff2988c88b1720173bbc119475ca5d5476022556325fa510d18e97c

    SHA512

    b6cd94c9323632dd7b167ac79d2eed8e88fa3e066110ebb079f2a4adc1fb255f79d2a653f602bc0359992daef4f795f31ebffeb178388dd38b3b0a066efdcf7f

  • \Users\Admin\bouuq.exe

    Filesize

    104KB

    MD5

    50b1bbbd3bba959ce3f489998d9771e9

    SHA1

    a35a1a37991d1f305af2ba2fff28c49bab32de8a

    SHA256

    22a472092ff2988c88b1720173bbc119475ca5d5476022556325fa510d18e97c

    SHA512

    b6cd94c9323632dd7b167ac79d2eed8e88fa3e066110ebb079f2a4adc1fb255f79d2a653f602bc0359992daef4f795f31ebffeb178388dd38b3b0a066efdcf7f

  • memory/960-54-0x00000000757A1000-0x00000000757A3000-memory.dmp

    Filesize

    8KB