Analysis

  • max time kernel
    164s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 15:23

General

  • Target

    b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe

  • Size

    268KB

  • MD5

    1f9017794d6c735ecc43d978842811b2

  • SHA1

    9e597ed9497770040a29671efaacf494a55a7760

  • SHA256

    b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db

  • SHA512

    c9cf7f29f527f59972af0958a1224d244babc115e5ff44cb5b007947c2b5150c7a5c096dab3c63288f409c47fcf786ab357eb021ee2e4423620c381aa0de0c08

  • SSDEEP

    6144:d+5MxrHPr5dFvW8HG4hz8I4v2SsQVnByGcSnuXLH6MG:M5MxrHVdFvW8Hf/4v2eVnByLXLM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe
    "C:\Users\Admin\AppData\Local\Temp\b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\seulo.exe
      "C:\Users\Admin\seulo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\seulo.exe

    Filesize

    268KB

    MD5

    87226b64a9a14dc95df43d6a32f90855

    SHA1

    76c80c8044516c03fe087b056d503d9c8021a459

    SHA256

    2bf8f77ae35257529551147d538c3446818da8b445f66a7c976cb5e3d5a49a47

    SHA512

    0356e7b2569840007c0146a8a4c51bc0c722508396ecb7430a54c5d8f5893b4e44df006be2e7c82968a1213ed716bb7ff56a3aee0413bcb6ee109a9de9ecfd7d

  • C:\Users\Admin\seulo.exe

    Filesize

    268KB

    MD5

    87226b64a9a14dc95df43d6a32f90855

    SHA1

    76c80c8044516c03fe087b056d503d9c8021a459

    SHA256

    2bf8f77ae35257529551147d538c3446818da8b445f66a7c976cb5e3d5a49a47

    SHA512

    0356e7b2569840007c0146a8a4c51bc0c722508396ecb7430a54c5d8f5893b4e44df006be2e7c82968a1213ed716bb7ff56a3aee0413bcb6ee109a9de9ecfd7d

  • \Users\Admin\seulo.exe

    Filesize

    268KB

    MD5

    87226b64a9a14dc95df43d6a32f90855

    SHA1

    76c80c8044516c03fe087b056d503d9c8021a459

    SHA256

    2bf8f77ae35257529551147d538c3446818da8b445f66a7c976cb5e3d5a49a47

    SHA512

    0356e7b2569840007c0146a8a4c51bc0c722508396ecb7430a54c5d8f5893b4e44df006be2e7c82968a1213ed716bb7ff56a3aee0413bcb6ee109a9de9ecfd7d

  • \Users\Admin\seulo.exe

    Filesize

    268KB

    MD5

    87226b64a9a14dc95df43d6a32f90855

    SHA1

    76c80c8044516c03fe087b056d503d9c8021a459

    SHA256

    2bf8f77ae35257529551147d538c3446818da8b445f66a7c976cb5e3d5a49a47

    SHA512

    0356e7b2569840007c0146a8a4c51bc0c722508396ecb7430a54c5d8f5893b4e44df006be2e7c82968a1213ed716bb7ff56a3aee0413bcb6ee109a9de9ecfd7d

  • memory/1648-56-0x0000000075BE1000-0x0000000075BE3000-memory.dmp

    Filesize

    8KB