Analysis

  • max time kernel
    71s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:39

General

  • Target

    ae0665acff6dbc3b259e9baef24d10094880f32e7a4e354741561fcb3a2ac989.exe

  • Size

    477KB

  • MD5

    12ab1e4f289b90d9898768f9370f392c

  • SHA1

    4940b25e32c4210b94dce806fba276272892a683

  • SHA256

    ae0665acff6dbc3b259e9baef24d10094880f32e7a4e354741561fcb3a2ac989

  • SHA512

    d2a973294823cb025c8f4c3813a7877779ff43d9ed3a90132daed949fa5dc124cae160201366f34977da013433af6febb45dc4758a47f54cc95452e1644214fd

  • SSDEEP

    12288:FsvU983wtVMtkaMjY6r+kRkBb63vd1Mp8upU5ks4FW:FF2wAOt+w2Y1Mp8ul4

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 20 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae0665acff6dbc3b259e9baef24d10094880f32e7a4e354741561fcb3a2ac989.exe
    "C:\Users\Admin\AppData\Local\Temp\ae0665acff6dbc3b259e9baef24d10094880f32e7a4e354741561fcb3a2ac989.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\T3K9ZAW7.exe
      T3K9ZAW7.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Users\Admin\muehu.exe
        "C:\Users\Admin\muehu.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:968
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del T3K9ZAW7.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:368
    • C:\Users\Admin\wot.exe
      wot.exe
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of AdjustPrivilegeToken
      PID:2008
    • C:\Users\Admin\xot.exe
      xot.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1300
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\gec1081.dll",Startup
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1212
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Users\Admin\AppData\Local\gec1081.dll",iep
          4⤵
          • Loads dropped DLL
          PID:424
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Users\Admin\AppData\Local\gec1081.dll",iep
          4⤵
          • Loads dropped DLL
          PID:2032
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del ae0665acff6dbc3b259e9baef24d10094880f32e7a4e354741561fcb3a2ac989.exe
      2⤵
      • Deletes itself
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • C:\Users\Admin\T3K9ZAW7.exe

    Filesize

    140KB

    MD5

    13af4de26b3ee9d02e8dd721f6b81fe9

    SHA1

    6036d52a71cc9a5f176db6d40cdea0e8d1b023ce

    SHA256

    10301813c139bbb2f2cbc5a47a8b78989c37cf56bfcdf8cbb2fd324057a799e3

    SHA512

    05c69348ac57578fdf81c035350ee6856ee17a72c1c1359013d5ec50430804c781753eb995870262157ba557c102285a4b012c2e53a73971213d9fdb269faa66

  • C:\Users\Admin\T3K9ZAW7.exe

    Filesize

    140KB

    MD5

    13af4de26b3ee9d02e8dd721f6b81fe9

    SHA1

    6036d52a71cc9a5f176db6d40cdea0e8d1b023ce

    SHA256

    10301813c139bbb2f2cbc5a47a8b78989c37cf56bfcdf8cbb2fd324057a799e3

    SHA512

    05c69348ac57578fdf81c035350ee6856ee17a72c1c1359013d5ec50430804c781753eb995870262157ba557c102285a4b012c2e53a73971213d9fdb269faa66

  • C:\Users\Admin\muehu.exe

    Filesize

    140KB

    MD5

    21cf637517be45e2fe556d2044bc39dd

    SHA1

    1c792cf4d22469f6f9929e279c9f44cdbc39c10c

    SHA256

    16bc60949bc2dd7b65d15d84c5a5ad6ba3c1af7c615385515a1eb3a79ac5c644

    SHA512

    fef73b3376ca0c1c8c780ee7eca3d482f7454be7b3e8f9bf26c2f91d45ed6ebaaaf340980051f07f4cc39d41a91165e7e1ac1188f2dd9adf0e0f66a124e514c1

  • C:\Users\Admin\muehu.exe

    Filesize

    140KB

    MD5

    21cf637517be45e2fe556d2044bc39dd

    SHA1

    1c792cf4d22469f6f9929e279c9f44cdbc39c10c

    SHA256

    16bc60949bc2dd7b65d15d84c5a5ad6ba3c1af7c615385515a1eb3a79ac5c644

    SHA512

    fef73b3376ca0c1c8c780ee7eca3d482f7454be7b3e8f9bf26c2f91d45ed6ebaaaf340980051f07f4cc39d41a91165e7e1ac1188f2dd9adf0e0f66a124e514c1

  • C:\Users\Admin\wot.exe

    Filesize

    175KB

    MD5

    c9b7e9a83250faf3135bb70343030c16

    SHA1

    f738cf9018d564ec802b684e38b54ecdf0a679f6

    SHA256

    26d3130abf8d1f0d234e7be1f28de877d7ae871ec96f179f9d49d8156c20c1ea

    SHA512

    2c574af59c9131a2917024f644176ca6311e6433be53d9602e4db873d01da16f9e1f4dc7952b9b667a4f8fac346037e30d5337db5cd895c13b51635c44a024c4

  • C:\Users\Admin\wot.exe

    Filesize

    175KB

    MD5

    c9b7e9a83250faf3135bb70343030c16

    SHA1

    f738cf9018d564ec802b684e38b54ecdf0a679f6

    SHA256

    26d3130abf8d1f0d234e7be1f28de877d7ae871ec96f179f9d49d8156c20c1ea

    SHA512

    2c574af59c9131a2917024f644176ca6311e6433be53d9602e4db873d01da16f9e1f4dc7952b9b667a4f8fac346037e30d5337db5cd895c13b51635c44a024c4

  • C:\Users\Admin\xot.exe

    Filesize

    103KB

    MD5

    b47a4d45ef404a997dcd2f98fe4a1420

    SHA1

    e55a876e4098a705be35e1a9c78c65a97ae5f27d

    SHA256

    9863f46ae1d3e2f835b713e2fb32c831e27941b4cdbb11663780e2101df6289b

    SHA512

    1f83decef10da3e7537dde84cebfd4ec2ca7dab05e3fb72237ad2d627f544d493d501822bf0927bc3cc061442cbe779cf054b87da1decc77a3b9eb6fa07ebd20

  • C:\Users\Admin\xot.exe

    Filesize

    103KB

    MD5

    b47a4d45ef404a997dcd2f98fe4a1420

    SHA1

    e55a876e4098a705be35e1a9c78c65a97ae5f27d

    SHA256

    9863f46ae1d3e2f835b713e2fb32c831e27941b4cdbb11663780e2101df6289b

    SHA512

    1f83decef10da3e7537dde84cebfd4ec2ca7dab05e3fb72237ad2d627f544d493d501822bf0927bc3cc061442cbe779cf054b87da1decc77a3b9eb6fa07ebd20

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\AppData\Local\gec1081.dll

    Filesize

    103KB

    MD5

    b830953856e06807f6419663f6d05cc6

    SHA1

    1985aa83dbcaad52a6098a7bffcd8688f0d203aa

    SHA256

    ed89baf97368e00ae45aa798fda02ed521557898bd6c9c50b2b98a035dceb81e

    SHA512

    6553f322de9e87e3bff14a08c500b69aa2ce3a0946e25bf9464c7d7dca22d96ef2da2fe00ed86e2d687a9f8f4345ab5189130a7c95606275df19d2f9169b354b

  • \Users\Admin\T3K9ZAW7.exe

    Filesize

    140KB

    MD5

    13af4de26b3ee9d02e8dd721f6b81fe9

    SHA1

    6036d52a71cc9a5f176db6d40cdea0e8d1b023ce

    SHA256

    10301813c139bbb2f2cbc5a47a8b78989c37cf56bfcdf8cbb2fd324057a799e3

    SHA512

    05c69348ac57578fdf81c035350ee6856ee17a72c1c1359013d5ec50430804c781753eb995870262157ba557c102285a4b012c2e53a73971213d9fdb269faa66

  • \Users\Admin\T3K9ZAW7.exe

    Filesize

    140KB

    MD5

    13af4de26b3ee9d02e8dd721f6b81fe9

    SHA1

    6036d52a71cc9a5f176db6d40cdea0e8d1b023ce

    SHA256

    10301813c139bbb2f2cbc5a47a8b78989c37cf56bfcdf8cbb2fd324057a799e3

    SHA512

    05c69348ac57578fdf81c035350ee6856ee17a72c1c1359013d5ec50430804c781753eb995870262157ba557c102285a4b012c2e53a73971213d9fdb269faa66

  • \Users\Admin\muehu.exe

    Filesize

    140KB

    MD5

    21cf637517be45e2fe556d2044bc39dd

    SHA1

    1c792cf4d22469f6f9929e279c9f44cdbc39c10c

    SHA256

    16bc60949bc2dd7b65d15d84c5a5ad6ba3c1af7c615385515a1eb3a79ac5c644

    SHA512

    fef73b3376ca0c1c8c780ee7eca3d482f7454be7b3e8f9bf26c2f91d45ed6ebaaaf340980051f07f4cc39d41a91165e7e1ac1188f2dd9adf0e0f66a124e514c1

  • \Users\Admin\muehu.exe

    Filesize

    140KB

    MD5

    21cf637517be45e2fe556d2044bc39dd

    SHA1

    1c792cf4d22469f6f9929e279c9f44cdbc39c10c

    SHA256

    16bc60949bc2dd7b65d15d84c5a5ad6ba3c1af7c615385515a1eb3a79ac5c644

    SHA512

    fef73b3376ca0c1c8c780ee7eca3d482f7454be7b3e8f9bf26c2f91d45ed6ebaaaf340980051f07f4cc39d41a91165e7e1ac1188f2dd9adf0e0f66a124e514c1

  • \Users\Admin\wot.exe

    Filesize

    175KB

    MD5

    c9b7e9a83250faf3135bb70343030c16

    SHA1

    f738cf9018d564ec802b684e38b54ecdf0a679f6

    SHA256

    26d3130abf8d1f0d234e7be1f28de877d7ae871ec96f179f9d49d8156c20c1ea

    SHA512

    2c574af59c9131a2917024f644176ca6311e6433be53d9602e4db873d01da16f9e1f4dc7952b9b667a4f8fac346037e30d5337db5cd895c13b51635c44a024c4

  • \Users\Admin\wot.exe

    Filesize

    175KB

    MD5

    c9b7e9a83250faf3135bb70343030c16

    SHA1

    f738cf9018d564ec802b684e38b54ecdf0a679f6

    SHA256

    26d3130abf8d1f0d234e7be1f28de877d7ae871ec96f179f9d49d8156c20c1ea

    SHA512

    2c574af59c9131a2917024f644176ca6311e6433be53d9602e4db873d01da16f9e1f4dc7952b9b667a4f8fac346037e30d5337db5cd895c13b51635c44a024c4

  • \Users\Admin\xot.exe

    Filesize

    103KB

    MD5

    b47a4d45ef404a997dcd2f98fe4a1420

    SHA1

    e55a876e4098a705be35e1a9c78c65a97ae5f27d

    SHA256

    9863f46ae1d3e2f835b713e2fb32c831e27941b4cdbb11663780e2101df6289b

    SHA512

    1f83decef10da3e7537dde84cebfd4ec2ca7dab05e3fb72237ad2d627f544d493d501822bf0927bc3cc061442cbe779cf054b87da1decc77a3b9eb6fa07ebd20

  • \Users\Admin\xot.exe

    Filesize

    103KB

    MD5

    b47a4d45ef404a997dcd2f98fe4a1420

    SHA1

    e55a876e4098a705be35e1a9c78c65a97ae5f27d

    SHA256

    9863f46ae1d3e2f835b713e2fb32c831e27941b4cdbb11663780e2101df6289b

    SHA512

    1f83decef10da3e7537dde84cebfd4ec2ca7dab05e3fb72237ad2d627f544d493d501822bf0927bc3cc061442cbe779cf054b87da1decc77a3b9eb6fa07ebd20

  • memory/368-112-0x0000000000000000-mapping.dmp

  • memory/424-102-0x00000000001F1000-0x00000000001FE000-memory.dmp

    Filesize

    52KB

  • memory/424-88-0x0000000000000000-mapping.dmp

  • memory/968-106-0x0000000000000000-mapping.dmp

  • memory/1108-56-0x0000000000000000-mapping.dmp

  • memory/1212-82-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1212-86-0x0000000002311000-0x000000000231E000-memory.dmp

    Filesize

    52KB

  • memory/1212-73-0x0000000000000000-mapping.dmp

  • memory/1300-64-0x0000000000000000-mapping.dmp

  • memory/1300-83-0x0000000001E61000-0x0000000001E6E000-memory.dmp

    Filesize

    52KB

  • memory/1300-69-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1616-111-0x0000000000000000-mapping.dmp

  • memory/1988-72-0x0000000000000000-mapping.dmp

  • memory/2008-84-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2008-75-0x00000000001F0000-0x0000000000247000-memory.dmp

    Filesize

    348KB

  • memory/2008-67-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

    Filesize

    8KB

  • memory/2008-85-0x00000000001F0000-0x0000000000247000-memory.dmp

    Filesize

    348KB

  • memory/2008-60-0x0000000000000000-mapping.dmp

  • memory/2032-89-0x0000000000000000-mapping.dmp

  • memory/2032-113-0x00000000020B1000-0x00000000020BE000-memory.dmp

    Filesize

    52KB