Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 16:41

General

  • Target

    12548c3140d21446896e15a5188768999a7a895b6cd25136b51203598d241bd9.exe

  • Size

    280KB

  • MD5

    4c224ca41d035e3c79e59aed857a1ec0

  • SHA1

    9e4bc1c0a0c8d6de72d6bb53d20acfb75555acee

  • SHA256

    12548c3140d21446896e15a5188768999a7a895b6cd25136b51203598d241bd9

  • SHA512

    07e9e133d472f8947b250b913d351dafc32bf7ae2830480f624fd2dcf0ec91d9f43148fcbd8f251c5dbfd427fb63efc10fc7c8e11de1f32c76a714ee9a00ef32

  • SSDEEP

    3072:IaZFviHOPiu8aQe3TqDUCiGjHJDbRv9y+qwa+rZf/M2BXOg:1FviHOf3TqD+0HBb5ta+rZ3Mat

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12548c3140d21446896e15a5188768999a7a895b6cd25136b51203598d241bd9.exe
    "C:\Users\Admin\AppData\Local\Temp\12548c3140d21446896e15a5188768999a7a895b6cd25136b51203598d241bd9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Users\Admin\liook.exe
      "C:\Users\Admin\liook.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\liook.exe

    Filesize

    280KB

    MD5

    cac15b80aef215e5ec545f0284f0d9ff

    SHA1

    d87b2bf0bdb1db725d8f3f3344ec392f274a6e35

    SHA256

    6b32f0ec1a2553b91c2d73a9ac2c002f5ba0a5d6bee18e89d6ddfb8dc74b6da4

    SHA512

    e72953ef7b64dabb4266cee064aa9253126ab9cc90e85c07925170950b253468b631b22396da09f370f07a6cf36fb25ab7b72ec775b1c35acd923632fccf8251

  • C:\Users\Admin\liook.exe

    Filesize

    280KB

    MD5

    cac15b80aef215e5ec545f0284f0d9ff

    SHA1

    d87b2bf0bdb1db725d8f3f3344ec392f274a6e35

    SHA256

    6b32f0ec1a2553b91c2d73a9ac2c002f5ba0a5d6bee18e89d6ddfb8dc74b6da4

    SHA512

    e72953ef7b64dabb4266cee064aa9253126ab9cc90e85c07925170950b253468b631b22396da09f370f07a6cf36fb25ab7b72ec775b1c35acd923632fccf8251

  • \Users\Admin\liook.exe

    Filesize

    280KB

    MD5

    cac15b80aef215e5ec545f0284f0d9ff

    SHA1

    d87b2bf0bdb1db725d8f3f3344ec392f274a6e35

    SHA256

    6b32f0ec1a2553b91c2d73a9ac2c002f5ba0a5d6bee18e89d6ddfb8dc74b6da4

    SHA512

    e72953ef7b64dabb4266cee064aa9253126ab9cc90e85c07925170950b253468b631b22396da09f370f07a6cf36fb25ab7b72ec775b1c35acd923632fccf8251

  • \Users\Admin\liook.exe

    Filesize

    280KB

    MD5

    cac15b80aef215e5ec545f0284f0d9ff

    SHA1

    d87b2bf0bdb1db725d8f3f3344ec392f274a6e35

    SHA256

    6b32f0ec1a2553b91c2d73a9ac2c002f5ba0a5d6bee18e89d6ddfb8dc74b6da4

    SHA512

    e72953ef7b64dabb4266cee064aa9253126ab9cc90e85c07925170950b253468b631b22396da09f370f07a6cf36fb25ab7b72ec775b1c35acd923632fccf8251

  • memory/960-59-0x0000000000000000-mapping.dmp

  • memory/1536-56-0x0000000076871000-0x0000000076873000-memory.dmp

    Filesize

    8KB