Analysis

  • max time kernel
    160s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 14:36

General

  • Target

    1cb10ec7beb58469dfa68eee1bf959ab7630ea7d8fd894764186d150cd4e6bf2.exe

  • Size

    312KB

  • MD5

    1ab269da4df02c3507e1880eca10b734

  • SHA1

    3545098309f34b2972e01b8ea3be7b2e70dde2d3

  • SHA256

    1cb10ec7beb58469dfa68eee1bf959ab7630ea7d8fd894764186d150cd4e6bf2

  • SHA512

    225205a2eb5412aeba190a4d706473f8aae47b417bf3b282dd1590f2c337f3fdf1171eecd93517ab46e637a97badd19249788c7d1239bf1f8c0e83bf8435807e

  • SSDEEP

    6144:pZXeP2DxXgYIlqAnIVDC8e5uMSXGJZPBP3Jm90GFh:CAxXgYMNIVa5uM1D/U0sh

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cb10ec7beb58469dfa68eee1bf959ab7630ea7d8fd894764186d150cd4e6bf2.exe
    "C:\Users\Admin\AppData\Local\Temp\1cb10ec7beb58469dfa68eee1bf959ab7630ea7d8fd894764186d150cd4e6bf2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Users\Admin\cauaf.exe
      "C:\Users\Admin\cauaf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\cauaf.exe

    Filesize

    312KB

    MD5

    25d6597ac11b5c88c83895b1be6ab241

    SHA1

    bd7fcb725cefcc01c887682416a4ef375bfd541d

    SHA256

    62fb01515d22b1bbf412fa7566258625c5288b1ca6732f06290731e55722df2b

    SHA512

    c26d622ea6eef4a375b2fedaa91ae3629c3b4a67afea3c5970c86f5a00e867819ee9df1d82b01a82c780da89c2115df5eb19406431bf0e60ebfbaca341c26071

  • C:\Users\Admin\cauaf.exe

    Filesize

    312KB

    MD5

    25d6597ac11b5c88c83895b1be6ab241

    SHA1

    bd7fcb725cefcc01c887682416a4ef375bfd541d

    SHA256

    62fb01515d22b1bbf412fa7566258625c5288b1ca6732f06290731e55722df2b

    SHA512

    c26d622ea6eef4a375b2fedaa91ae3629c3b4a67afea3c5970c86f5a00e867819ee9df1d82b01a82c780da89c2115df5eb19406431bf0e60ebfbaca341c26071

  • \Users\Admin\cauaf.exe

    Filesize

    312KB

    MD5

    25d6597ac11b5c88c83895b1be6ab241

    SHA1

    bd7fcb725cefcc01c887682416a4ef375bfd541d

    SHA256

    62fb01515d22b1bbf412fa7566258625c5288b1ca6732f06290731e55722df2b

    SHA512

    c26d622ea6eef4a375b2fedaa91ae3629c3b4a67afea3c5970c86f5a00e867819ee9df1d82b01a82c780da89c2115df5eb19406431bf0e60ebfbaca341c26071

  • \Users\Admin\cauaf.exe

    Filesize

    312KB

    MD5

    25d6597ac11b5c88c83895b1be6ab241

    SHA1

    bd7fcb725cefcc01c887682416a4ef375bfd541d

    SHA256

    62fb01515d22b1bbf412fa7566258625c5288b1ca6732f06290731e55722df2b

    SHA512

    c26d622ea6eef4a375b2fedaa91ae3629c3b4a67afea3c5970c86f5a00e867819ee9df1d82b01a82c780da89c2115df5eb19406431bf0e60ebfbaca341c26071

  • memory/576-59-0x0000000000000000-mapping.dmp

  • memory/968-56-0x0000000076D71000-0x0000000076D73000-memory.dmp

    Filesize

    8KB