Analysis

  • max time kernel
    152s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 15:03

General

  • Target

    d005fa42e2626ef38b5414845a10a53fe946605206321e4a64e6a9ba13771332.exe

  • Size

    232KB

  • MD5

    0edcff3ea8dd37080e1f56cf56a7e3cc

  • SHA1

    dbfbbc90433539738c320eb9b745bcb31624bf6e

  • SHA256

    d005fa42e2626ef38b5414845a10a53fe946605206321e4a64e6a9ba13771332

  • SHA512

    414146740e6049a749ecd3df4820ad1a15efc6dd891815579ec0f44ef4040bc90e471c047814d6bb47a9fbbfc6a37fe4c0f2ac2e544b2bacd0d05df4dab9a2e3

  • SSDEEP

    6144:T83PFKs78g2KyEOaWEqxF6snji81RUinKdNOA1:yPh+mFf

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d005fa42e2626ef38b5414845a10a53fe946605206321e4a64e6a9ba13771332.exe
    "C:\Users\Admin\AppData\Local\Temp\d005fa42e2626ef38b5414845a10a53fe946605206321e4a64e6a9ba13771332.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\douut.exe
      "C:\Users\Admin\douut.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\douut.exe

    Filesize

    232KB

    MD5

    c11c6359f8388ffd397cae8f4744489c

    SHA1

    a151f017c9cf61822fdd09ae8f41a541510a99b4

    SHA256

    474a12e1eb3144c74a0d5add26125ac02a6677bbdb3f55f1cde8d4767ed9b6ae

    SHA512

    0754131c199f3108c10dbadc82922bf680438f07e280cd1d2403c627d255fafae1edc6564f1fd3a07663f170eaa8a6e13561ccc11027e985e3b69b512793790e

  • C:\Users\Admin\douut.exe

    Filesize

    232KB

    MD5

    c11c6359f8388ffd397cae8f4744489c

    SHA1

    a151f017c9cf61822fdd09ae8f41a541510a99b4

    SHA256

    474a12e1eb3144c74a0d5add26125ac02a6677bbdb3f55f1cde8d4767ed9b6ae

    SHA512

    0754131c199f3108c10dbadc82922bf680438f07e280cd1d2403c627d255fafae1edc6564f1fd3a07663f170eaa8a6e13561ccc11027e985e3b69b512793790e

  • \Users\Admin\douut.exe

    Filesize

    232KB

    MD5

    c11c6359f8388ffd397cae8f4744489c

    SHA1

    a151f017c9cf61822fdd09ae8f41a541510a99b4

    SHA256

    474a12e1eb3144c74a0d5add26125ac02a6677bbdb3f55f1cde8d4767ed9b6ae

    SHA512

    0754131c199f3108c10dbadc82922bf680438f07e280cd1d2403c627d255fafae1edc6564f1fd3a07663f170eaa8a6e13561ccc11027e985e3b69b512793790e

  • \Users\Admin\douut.exe

    Filesize

    232KB

    MD5

    c11c6359f8388ffd397cae8f4744489c

    SHA1

    a151f017c9cf61822fdd09ae8f41a541510a99b4

    SHA256

    474a12e1eb3144c74a0d5add26125ac02a6677bbdb3f55f1cde8d4767ed9b6ae

    SHA512

    0754131c199f3108c10dbadc82922bf680438f07e280cd1d2403c627d255fafae1edc6564f1fd3a07663f170eaa8a6e13561ccc11027e985e3b69b512793790e

  • memory/368-56-0x0000000076401000-0x0000000076403000-memory.dmp

    Filesize

    8KB