Analysis

  • max time kernel
    152s
  • max time network
    80s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:49

General

  • Target

    0f204231eebf22117038a459ae3336b989db86ddcaba337b19f40e3c6d34b51d.exe

  • Size

    224KB

  • MD5

    4ace3636604797c9f776f82971c2a552

  • SHA1

    65f5ecba198a7897aa4496906d6b9f0b2a91067f

  • SHA256

    0f204231eebf22117038a459ae3336b989db86ddcaba337b19f40e3c6d34b51d

  • SHA512

    681d6f21756c27aa38d66bb06aaff9ef64ddee903e5d9f96820785f5ae48be46726b8d1915d88334bbb6c7c5c0fc0d5ca5e983d211ab6ac8a30724668193c635

  • SSDEEP

    3072:kXyqNsMoBuDZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax2+l:7qN5Tp4LnbmlrZW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f204231eebf22117038a459ae3336b989db86ddcaba337b19f40e3c6d34b51d.exe
    "C:\Users\Admin\AppData\Local\Temp\0f204231eebf22117038a459ae3336b989db86ddcaba337b19f40e3c6d34b51d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Users\Admin\wckeg.exe
      "C:\Users\Admin\wckeg.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1168

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wckeg.exe
    Filesize

    224KB

    MD5

    306c12cf6dfc93eea73d249505e405eb

    SHA1

    bcf770ba43f4dab39d14ec5c1ca464f9d2e97940

    SHA256

    a9ffce00614184b1dc678dcdf2672bab9d51dad1286053f7f85f67293ff4e643

    SHA512

    311535e2e21d807715e8599e69d6cfa72fee63a8b71553de80095ad3e375411c9c16abd7d54cd03f3f67c060d0d14482b05d1356aa143246238e32d315dae471

  • C:\Users\Admin\wckeg.exe
    Filesize

    224KB

    MD5

    306c12cf6dfc93eea73d249505e405eb

    SHA1

    bcf770ba43f4dab39d14ec5c1ca464f9d2e97940

    SHA256

    a9ffce00614184b1dc678dcdf2672bab9d51dad1286053f7f85f67293ff4e643

    SHA512

    311535e2e21d807715e8599e69d6cfa72fee63a8b71553de80095ad3e375411c9c16abd7d54cd03f3f67c060d0d14482b05d1356aa143246238e32d315dae471

  • \Users\Admin\wckeg.exe
    Filesize

    224KB

    MD5

    306c12cf6dfc93eea73d249505e405eb

    SHA1

    bcf770ba43f4dab39d14ec5c1ca464f9d2e97940

    SHA256

    a9ffce00614184b1dc678dcdf2672bab9d51dad1286053f7f85f67293ff4e643

    SHA512

    311535e2e21d807715e8599e69d6cfa72fee63a8b71553de80095ad3e375411c9c16abd7d54cd03f3f67c060d0d14482b05d1356aa143246238e32d315dae471

  • \Users\Admin\wckeg.exe
    Filesize

    224KB

    MD5

    306c12cf6dfc93eea73d249505e405eb

    SHA1

    bcf770ba43f4dab39d14ec5c1ca464f9d2e97940

    SHA256

    a9ffce00614184b1dc678dcdf2672bab9d51dad1286053f7f85f67293ff4e643

    SHA512

    311535e2e21d807715e8599e69d6cfa72fee63a8b71553de80095ad3e375411c9c16abd7d54cd03f3f67c060d0d14482b05d1356aa143246238e32d315dae471

  • memory/1168-59-0x0000000000000000-mapping.dmp
  • memory/1584-56-0x0000000075C81000-0x0000000075C83000-memory.dmp
    Filesize

    8KB