Analysis

  • max time kernel
    151s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 08:06

General

  • Target

    b637eedc366522320a2ed97ec8a84bb0b314db257faa1c83581d756e0c7ef78b.exe

  • Size

    84KB

  • MD5

    9396f5d3bf6c52d523425b09bb0d8670

  • SHA1

    2e7ecfafd4559b7a55957f43a4b6802296367d4b

  • SHA256

    b637eedc366522320a2ed97ec8a84bb0b314db257faa1c83581d756e0c7ef78b

  • SHA512

    1985440ab5ba4b16c46ed0033a98ebda8284b9fea3db666765ce68eda055743f3b2de6806d188723014231ff3e7784699a02d5c090d9a93303da154b5738737c

  • SSDEEP

    768:s9Whb6K4Fd6eUCRGIIPP1y7oLacaIBLP3nEZCcLX/CVSFJ0T72Uap5/7TON+7:shTFTUCxQ1a1ocTzFJ0T72VpF7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b637eedc366522320a2ed97ec8a84bb0b314db257faa1c83581d756e0c7ef78b.exe
    "C:\Users\Admin\AppData\Local\Temp\b637eedc366522320a2ed97ec8a84bb0b314db257faa1c83581d756e0c7ef78b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\yiuyiuv.exe
      "C:\Users\Admin\yiuyiuv.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:892

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\yiuyiuv.exe

          Filesize

          84KB

          MD5

          b14c17ab015c26a1e9b95ebb84fbc4c9

          SHA1

          a13ea2bd185c77844228e9cbe8a87481793ed9eb

          SHA256

          cba18130a20b618c634907ad038951d50b19a0589ac58ccdb07cfa01e80aea38

          SHA512

          22e093efe547e3afaf100ff28d3280b2bf5ed07781e4d3e2e842bf918ef2b0ee70be4425ed02991793a9879f00ed1b5dc2f38a872a7378b8185f501549581d10

        • C:\Users\Admin\yiuyiuv.exe

          Filesize

          84KB

          MD5

          b14c17ab015c26a1e9b95ebb84fbc4c9

          SHA1

          a13ea2bd185c77844228e9cbe8a87481793ed9eb

          SHA256

          cba18130a20b618c634907ad038951d50b19a0589ac58ccdb07cfa01e80aea38

          SHA512

          22e093efe547e3afaf100ff28d3280b2bf5ed07781e4d3e2e842bf918ef2b0ee70be4425ed02991793a9879f00ed1b5dc2f38a872a7378b8185f501549581d10

        • \Users\Admin\yiuyiuv.exe

          Filesize

          84KB

          MD5

          b14c17ab015c26a1e9b95ebb84fbc4c9

          SHA1

          a13ea2bd185c77844228e9cbe8a87481793ed9eb

          SHA256

          cba18130a20b618c634907ad038951d50b19a0589ac58ccdb07cfa01e80aea38

          SHA512

          22e093efe547e3afaf100ff28d3280b2bf5ed07781e4d3e2e842bf918ef2b0ee70be4425ed02991793a9879f00ed1b5dc2f38a872a7378b8185f501549581d10

        • \Users\Admin\yiuyiuv.exe

          Filesize

          84KB

          MD5

          b14c17ab015c26a1e9b95ebb84fbc4c9

          SHA1

          a13ea2bd185c77844228e9cbe8a87481793ed9eb

          SHA256

          cba18130a20b618c634907ad038951d50b19a0589ac58ccdb07cfa01e80aea38

          SHA512

          22e093efe547e3afaf100ff28d3280b2bf5ed07781e4d3e2e842bf918ef2b0ee70be4425ed02991793a9879f00ed1b5dc2f38a872a7378b8185f501549581d10

        • memory/1976-56-0x0000000074D81000-0x0000000074D83000-memory.dmp

          Filesize

          8KB