Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 20:44

General

  • Target

    f1b9d3d26d3ac7663f260be5437e0360356f6ddc64ce47144be2f503b55c3049.exe

  • Size

    140KB

  • MD5

    0870da16762a809b62c0899eced9d761

  • SHA1

    5488feed783acd8b8d93096b6a6050015fd75bcd

  • SHA256

    f1b9d3d26d3ac7663f260be5437e0360356f6ddc64ce47144be2f503b55c3049

  • SHA512

    0c2a67d53e512bfb4a27fc095b85484300cb7052f12bdfe87d743ef32052b197f5cc474c88ecde22ac270e0a4ebccc79fd31faf4dc90cad131a0ff657311ae9f

  • SSDEEP

    3072:Pl2rgluJmkD73mQtFDPB1P85XvbM7h8bdaqmRIxqeHHNMxi5AM2:Psr6uJ/72QtFDPB1P85Xvw7h8boqfqeu

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1b9d3d26d3ac7663f260be5437e0360356f6ddc64ce47144be2f503b55c3049.exe
    "C:\Users\Admin\AppData\Local\Temp\f1b9d3d26d3ac7663f260be5437e0360356f6ddc64ce47144be2f503b55c3049.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Users\Admin\xeuaxa.exe
      "C:\Users\Admin\xeuaxa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:276

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\xeuaxa.exe

          Filesize

          140KB

          MD5

          3e8d4d7343f3069cd5885fa4d043edf5

          SHA1

          4c1dc250b3ec6d4cd9da6f1448251ed534cb1258

          SHA256

          ea9c82d1049b8b146edf30d47ab7c427ba6dd0be11724333ea4e4ee5e309ff23

          SHA512

          a3b2bac0152e1a4a110a3d361b98ff748c5e1aaabd067fe9c0b79777b701a674b5686cb24df4dff325c2eb31e808503683ac00fa33f4c3027c0e22594729ea92

        • C:\Users\Admin\xeuaxa.exe

          Filesize

          140KB

          MD5

          3e8d4d7343f3069cd5885fa4d043edf5

          SHA1

          4c1dc250b3ec6d4cd9da6f1448251ed534cb1258

          SHA256

          ea9c82d1049b8b146edf30d47ab7c427ba6dd0be11724333ea4e4ee5e309ff23

          SHA512

          a3b2bac0152e1a4a110a3d361b98ff748c5e1aaabd067fe9c0b79777b701a674b5686cb24df4dff325c2eb31e808503683ac00fa33f4c3027c0e22594729ea92

        • \Users\Admin\xeuaxa.exe

          Filesize

          140KB

          MD5

          3e8d4d7343f3069cd5885fa4d043edf5

          SHA1

          4c1dc250b3ec6d4cd9da6f1448251ed534cb1258

          SHA256

          ea9c82d1049b8b146edf30d47ab7c427ba6dd0be11724333ea4e4ee5e309ff23

          SHA512

          a3b2bac0152e1a4a110a3d361b98ff748c5e1aaabd067fe9c0b79777b701a674b5686cb24df4dff325c2eb31e808503683ac00fa33f4c3027c0e22594729ea92

        • \Users\Admin\xeuaxa.exe

          Filesize

          140KB

          MD5

          3e8d4d7343f3069cd5885fa4d043edf5

          SHA1

          4c1dc250b3ec6d4cd9da6f1448251ed534cb1258

          SHA256

          ea9c82d1049b8b146edf30d47ab7c427ba6dd0be11724333ea4e4ee5e309ff23

          SHA512

          a3b2bac0152e1a4a110a3d361b98ff748c5e1aaabd067fe9c0b79777b701a674b5686cb24df4dff325c2eb31e808503683ac00fa33f4c3027c0e22594729ea92

        • memory/1468-56-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

          Filesize

          8KB