Analysis

  • max time kernel
    152s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 18:34

General

  • Target

    bb13a64087e07a1ed466f86da178ff202ac0b889332eef62e4a50989ca1793dc.exe

  • Size

    304KB

  • MD5

    834ccbcfc4daf7d372b0d93b685ca590

  • SHA1

    16946f40adedfc3ee7f21d04a39fe3e3ec9137ab

  • SHA256

    bb13a64087e07a1ed466f86da178ff202ac0b889332eef62e4a50989ca1793dc

  • SHA512

    2efc66ba8d55a70e10a1894803d1ef7d7a1331ca3fc2c741f7a971afd1b5727cdf59e1af11c4c1bd8453e7c434a196e84f6a7aa4092b21a52a153e945a3af0f5

  • SSDEEP

    3072:7Vf1i2Dwhe6YIRnbXtcU7qTzKqc+Mk1op2aEaDFHT+7pvPxvaBS:6xG6Xkxla8xb

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb13a64087e07a1ed466f86da178ff202ac0b889332eef62e4a50989ca1793dc.exe
    "C:\Users\Admin\AppData\Local\Temp\bb13a64087e07a1ed466f86da178ff202ac0b889332eef62e4a50989ca1793dc.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Users\Admin\gsfaef.exe
      "C:\Users\Admin\gsfaef.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gsfaef.exe

    Filesize

    304KB

    MD5

    7ed8191f911a16f5d9b524ca33cbc029

    SHA1

    781142c78ee7e8c0a6137e8655d6f18ec32865f3

    SHA256

    44f77f441a67dc9dd4b14eaf29a9376b0d90b24f35d744f30fc788d1f0ca89d1

    SHA512

    94c25d94de5337a8015e3438dd99a17f1d2b7eb2e8aab272725eacb1a2f4251fe36d0900e83f8c5747c51c4b52b38dc7d9a1500fcec3cdd2e63c96c39cbf0a87

  • C:\Users\Admin\gsfaef.exe

    Filesize

    304KB

    MD5

    7ed8191f911a16f5d9b524ca33cbc029

    SHA1

    781142c78ee7e8c0a6137e8655d6f18ec32865f3

    SHA256

    44f77f441a67dc9dd4b14eaf29a9376b0d90b24f35d744f30fc788d1f0ca89d1

    SHA512

    94c25d94de5337a8015e3438dd99a17f1d2b7eb2e8aab272725eacb1a2f4251fe36d0900e83f8c5747c51c4b52b38dc7d9a1500fcec3cdd2e63c96c39cbf0a87

  • \Users\Admin\gsfaef.exe

    Filesize

    304KB

    MD5

    7ed8191f911a16f5d9b524ca33cbc029

    SHA1

    781142c78ee7e8c0a6137e8655d6f18ec32865f3

    SHA256

    44f77f441a67dc9dd4b14eaf29a9376b0d90b24f35d744f30fc788d1f0ca89d1

    SHA512

    94c25d94de5337a8015e3438dd99a17f1d2b7eb2e8aab272725eacb1a2f4251fe36d0900e83f8c5747c51c4b52b38dc7d9a1500fcec3cdd2e63c96c39cbf0a87

  • \Users\Admin\gsfaef.exe

    Filesize

    304KB

    MD5

    7ed8191f911a16f5d9b524ca33cbc029

    SHA1

    781142c78ee7e8c0a6137e8655d6f18ec32865f3

    SHA256

    44f77f441a67dc9dd4b14eaf29a9376b0d90b24f35d744f30fc788d1f0ca89d1

    SHA512

    94c25d94de5337a8015e3438dd99a17f1d2b7eb2e8aab272725eacb1a2f4251fe36d0900e83f8c5747c51c4b52b38dc7d9a1500fcec3cdd2e63c96c39cbf0a87

  • memory/908-56-0x00000000761F1000-0x00000000761F3000-memory.dmp

    Filesize

    8KB