Analysis

  • max time kernel
    151s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 19:12

General

  • Target

    c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe

  • Size

    248KB

  • MD5

    81a4278f7b4f2f52afec5958c81df1b2

  • SHA1

    a9acdff83f0741d56be8d16e84a87711b5d5328e

  • SHA256

    c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909

  • SHA512

    3346a76f945a5abf0548f0154597e31e827ad79f9f59890dbeba6a6fdcdb6e7a85a6c1097911d3a06a1729b986b5922416effdbff33b70d7eb7f01933d1a3a79

  • SSDEEP

    1536:jgUTCIP+MZH9Oj0IaxamasaXaq4noBU66yVZxrkEhq7:oI2f0n7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe
    "C:\Users\Admin\AppData\Local\Temp\c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\waigef.exe
      "C:\Users\Admin\waigef.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\waigef.exe

    Filesize

    248KB

    MD5

    71f596558a4311bc705751ec31df000b

    SHA1

    8aa04bf643747319fbde7b34e9227905e9be6803

    SHA256

    ed63dd1eb29e27f6aac484f4fc23d71e41301e3035ead94099d352e27ed80133

    SHA512

    f9c362fa7b51b9843737e5cf5ae7b7cbc5c232f706ff8f1fd07f5fbd3a3b3447c485d86817ace9d0ba995dc0cc2d824505d9d84f3bbeb3b637d2b3433fbff9e0

  • C:\Users\Admin\waigef.exe

    Filesize

    248KB

    MD5

    71f596558a4311bc705751ec31df000b

    SHA1

    8aa04bf643747319fbde7b34e9227905e9be6803

    SHA256

    ed63dd1eb29e27f6aac484f4fc23d71e41301e3035ead94099d352e27ed80133

    SHA512

    f9c362fa7b51b9843737e5cf5ae7b7cbc5c232f706ff8f1fd07f5fbd3a3b3447c485d86817ace9d0ba995dc0cc2d824505d9d84f3bbeb3b637d2b3433fbff9e0

  • \Users\Admin\waigef.exe

    Filesize

    248KB

    MD5

    71f596558a4311bc705751ec31df000b

    SHA1

    8aa04bf643747319fbde7b34e9227905e9be6803

    SHA256

    ed63dd1eb29e27f6aac484f4fc23d71e41301e3035ead94099d352e27ed80133

    SHA512

    f9c362fa7b51b9843737e5cf5ae7b7cbc5c232f706ff8f1fd07f5fbd3a3b3447c485d86817ace9d0ba995dc0cc2d824505d9d84f3bbeb3b637d2b3433fbff9e0

  • \Users\Admin\waigef.exe

    Filesize

    248KB

    MD5

    71f596558a4311bc705751ec31df000b

    SHA1

    8aa04bf643747319fbde7b34e9227905e9be6803

    SHA256

    ed63dd1eb29e27f6aac484f4fc23d71e41301e3035ead94099d352e27ed80133

    SHA512

    f9c362fa7b51b9843737e5cf5ae7b7cbc5c232f706ff8f1fd07f5fbd3a3b3447c485d86817ace9d0ba995dc0cc2d824505d9d84f3bbeb3b637d2b3433fbff9e0

  • memory/1552-59-0x0000000000000000-mapping.dmp

  • memory/1672-56-0x0000000075111000-0x0000000075113000-memory.dmp

    Filesize

    8KB