Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 20:20

General

  • Target

    c14ab199740f1ccd382b96683a2fe650a9aa97eeb444df1c605103b353589add.exe

  • Size

    204KB

  • MD5

    9239a5493475b1f899863183a43ff5d6

  • SHA1

    47fc117258e2bcaf955cd2f07d030efc9f6ae9a2

  • SHA256

    c14ab199740f1ccd382b96683a2fe650a9aa97eeb444df1c605103b353589add

  • SHA512

    3861b3b6500c71edbb1f68f8bcc856e6ee425441de6b2b81c6cbc461b2ddddef18c61f80207555cccdd81a4dc2914d66fd43a793c637c01945d548c2af85ed37

  • SSDEEP

    3072:DVr+bRqK57jQpI6d27GVV+FWl11oQB7t9X7aOQC:d+v57jQS6dQGVVmWOQFL7aOQC

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c14ab199740f1ccd382b96683a2fe650a9aa97eeb444df1c605103b353589add.exe
    "C:\Users\Admin\AppData\Local\Temp\c14ab199740f1ccd382b96683a2fe650a9aa97eeb444df1c605103b353589add.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\nwwak.exe
      "C:\Users\Admin\nwwak.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\nwwak.exe

    Filesize

    204KB

    MD5

    8582e3f59f8d9932040f86fec944364e

    SHA1

    491791b2f17f5dd5b2c9f726554bae96682a4275

    SHA256

    4fa9a5a65b8f3ba3f74552f1b7298b503fcf05e205d11191b86915f43760cd7c

    SHA512

    af85541df51b14a017eacba13a9c40c66f602c1ad0a2ff80bbb425503ff79dfd0af24a7ed8ceeaa8398e06a8b8707def5c3fa2f6140efccbf8a1ca7928521e1b

  • C:\Users\Admin\nwwak.exe

    Filesize

    204KB

    MD5

    8582e3f59f8d9932040f86fec944364e

    SHA1

    491791b2f17f5dd5b2c9f726554bae96682a4275

    SHA256

    4fa9a5a65b8f3ba3f74552f1b7298b503fcf05e205d11191b86915f43760cd7c

    SHA512

    af85541df51b14a017eacba13a9c40c66f602c1ad0a2ff80bbb425503ff79dfd0af24a7ed8ceeaa8398e06a8b8707def5c3fa2f6140efccbf8a1ca7928521e1b

  • \Users\Admin\nwwak.exe

    Filesize

    204KB

    MD5

    8582e3f59f8d9932040f86fec944364e

    SHA1

    491791b2f17f5dd5b2c9f726554bae96682a4275

    SHA256

    4fa9a5a65b8f3ba3f74552f1b7298b503fcf05e205d11191b86915f43760cd7c

    SHA512

    af85541df51b14a017eacba13a9c40c66f602c1ad0a2ff80bbb425503ff79dfd0af24a7ed8ceeaa8398e06a8b8707def5c3fa2f6140efccbf8a1ca7928521e1b

  • \Users\Admin\nwwak.exe

    Filesize

    204KB

    MD5

    8582e3f59f8d9932040f86fec944364e

    SHA1

    491791b2f17f5dd5b2c9f726554bae96682a4275

    SHA256

    4fa9a5a65b8f3ba3f74552f1b7298b503fcf05e205d11191b86915f43760cd7c

    SHA512

    af85541df51b14a017eacba13a9c40c66f602c1ad0a2ff80bbb425503ff79dfd0af24a7ed8ceeaa8398e06a8b8707def5c3fa2f6140efccbf8a1ca7928521e1b

  • memory/1784-59-0x0000000000000000-mapping.dmp

  • memory/1960-56-0x00000000751A1000-0x00000000751A3000-memory.dmp

    Filesize

    8KB