Analysis

  • max time kernel
    174s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:24

General

  • Target

    49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe

  • Size

    60KB

  • MD5

    be57bf494559581a52e67b35a994eee4

  • SHA1

    8784613380e22a72cf9e8404cf2562a4b5b36f1e

  • SHA256

    49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102

  • SHA512

    f6cbdacad846794a44449b0e858baf7a0befb5a7f8d47eba40474b9013955ade77d6080241cf18a899ad0e639f2badfd73f1402210a2706cd425d3ce5ff00a01

  • SSDEEP

    1536:Q/GRyei2Bso+gU7aG57rZifwFODTnF/w12TFZ9jDSN:bi2Bs0U7ZZ0wFch/w12TzgN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe
    "C:\Users\Admin\AppData\Local\Temp\49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\.exe
      "C:\Users\Admin\.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:948

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\.exe
    Filesize

    60KB

    MD5

    e84106ebe8e1da76cbc2432efa59fca0

    SHA1

    5c0e1dd594800a9f06751f166b7c15b087c808e0

    SHA256

    2ca621e3e570bbe705538961d157af750b6ba77f0af167130b5cc832bb2acb0c

    SHA512

    ed10ca83bd7f37680acb9c03786874041cce03add7b911f5ca7fd666fae7133d82ceb2befdd0188b2bb7379f4da5878ca575ef880de8c8e838412c0308dadb39

  • C:\Users\Admin\.exe
    Filesize

    60KB

    MD5

    e84106ebe8e1da76cbc2432efa59fca0

    SHA1

    5c0e1dd594800a9f06751f166b7c15b087c808e0

    SHA256

    2ca621e3e570bbe705538961d157af750b6ba77f0af167130b5cc832bb2acb0c

    SHA512

    ed10ca83bd7f37680acb9c03786874041cce03add7b911f5ca7fd666fae7133d82ceb2befdd0188b2bb7379f4da5878ca575ef880de8c8e838412c0308dadb39

  • \Users\Admin\.exe
    Filesize

    60KB

    MD5

    e84106ebe8e1da76cbc2432efa59fca0

    SHA1

    5c0e1dd594800a9f06751f166b7c15b087c808e0

    SHA256

    2ca621e3e570bbe705538961d157af750b6ba77f0af167130b5cc832bb2acb0c

    SHA512

    ed10ca83bd7f37680acb9c03786874041cce03add7b911f5ca7fd666fae7133d82ceb2befdd0188b2bb7379f4da5878ca575ef880de8c8e838412c0308dadb39

  • \Users\Admin\.exe
    Filesize

    60KB

    MD5

    e84106ebe8e1da76cbc2432efa59fca0

    SHA1

    5c0e1dd594800a9f06751f166b7c15b087c808e0

    SHA256

    2ca621e3e570bbe705538961d157af750b6ba77f0af167130b5cc832bb2acb0c

    SHA512

    ed10ca83bd7f37680acb9c03786874041cce03add7b911f5ca7fd666fae7133d82ceb2befdd0188b2bb7379f4da5878ca575ef880de8c8e838412c0308dadb39

  • memory/948-59-0x0000000000000000-mapping.dmp
  • memory/1324-56-0x0000000075A11000-0x0000000075A13000-memory.dmp
    Filesize

    8KB