Analysis

  • max time kernel
    172s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 20:49

General

  • Target

    9defef101c83a347319caeb4760dc869c0cb153083385fc79d3290a20e5a2969.exe

  • Size

    332KB

  • MD5

    0fccfd0283b142305296bc91cd549ae8

  • SHA1

    84ff95367bc758bc16c87eaaebda2e04d6e876da

  • SHA256

    9defef101c83a347319caeb4760dc869c0cb153083385fc79d3290a20e5a2969

  • SHA512

    f68d9c0d973c070b5a981e958155d5662d55ab62e1d28cd2a6999f582a80d5bdef0645386d1178584ece8f4b812ff4f52622ff90b72449c7aa07e4652f45171e

  • SSDEEP

    3072:XnkRRXlgkBfrvKk1jrLXvYNJOLlDrDxUfSGIf9b6L6VlMixFGI5FpqMBDzsUiztY:gRrZrRrLXeaHDxUadt382FxYIcUutY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9defef101c83a347319caeb4760dc869c0cb153083385fc79d3290a20e5a2969.exe
    "C:\Users\Admin\AppData\Local\Temp\9defef101c83a347319caeb4760dc869c0cb153083385fc79d3290a20e5a2969.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Users\Admin\melih.exe
      "C:\Users\Admin\melih.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\melih.exe

          Filesize

          332KB

          MD5

          92c89f4eca2c2454ad63e7ac91e24919

          SHA1

          c63d5388a43e94c34ee49f2fc8f86626985b8d3f

          SHA256

          6cbec739fc83b3c87fa0369bc123cd150f9c9b697966ec434224bdbfa63d88f2

          SHA512

          11fd913ff45f9833245686adb9b11d3e2cbc680724137ac7db9976771bac789bf0dd4281cfeafe75e0bef6ce4794ef6bed49ef6805fd80410735ce68eed00b7d

        • C:\Users\Admin\melih.exe

          Filesize

          332KB

          MD5

          92c89f4eca2c2454ad63e7ac91e24919

          SHA1

          c63d5388a43e94c34ee49f2fc8f86626985b8d3f

          SHA256

          6cbec739fc83b3c87fa0369bc123cd150f9c9b697966ec434224bdbfa63d88f2

          SHA512

          11fd913ff45f9833245686adb9b11d3e2cbc680724137ac7db9976771bac789bf0dd4281cfeafe75e0bef6ce4794ef6bed49ef6805fd80410735ce68eed00b7d

        • \Users\Admin\melih.exe

          Filesize

          332KB

          MD5

          92c89f4eca2c2454ad63e7ac91e24919

          SHA1

          c63d5388a43e94c34ee49f2fc8f86626985b8d3f

          SHA256

          6cbec739fc83b3c87fa0369bc123cd150f9c9b697966ec434224bdbfa63d88f2

          SHA512

          11fd913ff45f9833245686adb9b11d3e2cbc680724137ac7db9976771bac789bf0dd4281cfeafe75e0bef6ce4794ef6bed49ef6805fd80410735ce68eed00b7d

        • \Users\Admin\melih.exe

          Filesize

          332KB

          MD5

          92c89f4eca2c2454ad63e7ac91e24919

          SHA1

          c63d5388a43e94c34ee49f2fc8f86626985b8d3f

          SHA256

          6cbec739fc83b3c87fa0369bc123cd150f9c9b697966ec434224bdbfa63d88f2

          SHA512

          11fd913ff45f9833245686adb9b11d3e2cbc680724137ac7db9976771bac789bf0dd4281cfeafe75e0bef6ce4794ef6bed49ef6805fd80410735ce68eed00b7d

        • memory/1496-56-0x00000000761F1000-0x00000000761F3000-memory.dmp

          Filesize

          8KB