Analysis

  • max time kernel
    161s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 21:44

General

  • Target

    ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe

  • Size

    145KB

  • MD5

    0e61bcd8d38578b68186f146914e92e0

  • SHA1

    3ee7770f9a8e0c6c4a962659baa3082097fafcbc

  • SHA256

    ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2

  • SHA512

    1ba1abe81b25c6be41a198cf7b7ba76a9705da4e2f7d318d33cd85348a37fb6596464a9e5ca3dc40686f16101d8c2b7329cb5066c86a4fc8760e27b7c1c1b66d

  • SSDEEP

    3072:Mae+scKB6+j2KkErn71HXeUg7wlT0uawqoNLboIVcjb8lERGl:lsjSKkqTgya8J

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe
    "C:\Users\Admin\AppData\Local\Temp\ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\winlog.exe
      "C:\Windows\winlog.exe"
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\winlog.EXE

    Filesize

    68KB

    MD5

    e401ba63c7e3cb2942a1bb693c3e4232

    SHA1

    5c646e484e4860ce749dd29c5f5240679703bda5

    SHA256

    5d2bb760b61acbe991f7a2db850570448de01671487e89312e9f3f3ca88a1d41

    SHA512

    c9b25a1e182a763414a8533207115a4a9e5c0a72db61cc8f8b4a2f2f8e2abe78ed57f769f7db66b49c4b8f2b300de936a14faa9faa9b1262d1f242b2a13c8727

  • memory/1672-57-0x0000000000000000-mapping.dmp

  • memory/2028-56-0x0000000075561000-0x0000000075563000-memory.dmp

    Filesize

    8KB