Analysis

  • max time kernel
    161s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 16:44

General

  • Target

    8053aecfde7a31c5abb033c856720f1fdfcfef12b4f8512a60ca66b6980ea45f.exe

  • Size

    305KB

  • MD5

    423918282ae8e7ee8b6c0bcace1815a0

  • SHA1

    a13ec1f260d261e99fe26b16610a45c2b52d1f9e

  • SHA256

    8053aecfde7a31c5abb033c856720f1fdfcfef12b4f8512a60ca66b6980ea45f

  • SHA512

    85a083ed6ca4a1ca706c525a2500847771164e5086bac46eb4e8241eac4c9f1d4c774490be26618129a924b3e99dbb1e1459c0c6236152ed4d336274ec7b9014

  • SSDEEP

    3072:pa2YiHOPiu8aQe3TqDUCiGjHJDbRv9y+qwa+rZf/M2BXHGr/n:RYiHOf3TqD+0HBb5ta+rZ3MaWT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 45 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8053aecfde7a31c5abb033c856720f1fdfcfef12b4f8512a60ca66b6980ea45f.exe
    "C:\Users\Admin\AppData\Local\Temp\8053aecfde7a31c5abb033c856720f1fdfcfef12b4f8512a60ca66b6980ea45f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\geiodet.exe
      "C:\Users\Admin\geiodet.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\geiodet.exe

    Filesize

    305KB

    MD5

    cd4e470721581edb788f83adfbca3cb1

    SHA1

    6f4a2a30558cd95e49a3bf8c317929076fc6bc07

    SHA256

    ac4413e0b64ed34e521e3d97be2cd9de12d111b6e36d46570c6df9f039cccb2f

    SHA512

    29269adcf80d40afac6081945c2bb95e60d6673bf7a9244a8ea721efd8018a3f6f0c4c23132720874b33787ae17d078f1c3bde079fe631096152965c444e7098

  • C:\Users\Admin\geiodet.exe

    Filesize

    305KB

    MD5

    cd4e470721581edb788f83adfbca3cb1

    SHA1

    6f4a2a30558cd95e49a3bf8c317929076fc6bc07

    SHA256

    ac4413e0b64ed34e521e3d97be2cd9de12d111b6e36d46570c6df9f039cccb2f

    SHA512

    29269adcf80d40afac6081945c2bb95e60d6673bf7a9244a8ea721efd8018a3f6f0c4c23132720874b33787ae17d078f1c3bde079fe631096152965c444e7098

  • \Users\Admin\geiodet.exe

    Filesize

    305KB

    MD5

    cd4e470721581edb788f83adfbca3cb1

    SHA1

    6f4a2a30558cd95e49a3bf8c317929076fc6bc07

    SHA256

    ac4413e0b64ed34e521e3d97be2cd9de12d111b6e36d46570c6df9f039cccb2f

    SHA512

    29269adcf80d40afac6081945c2bb95e60d6673bf7a9244a8ea721efd8018a3f6f0c4c23132720874b33787ae17d078f1c3bde079fe631096152965c444e7098

  • \Users\Admin\geiodet.exe

    Filesize

    305KB

    MD5

    cd4e470721581edb788f83adfbca3cb1

    SHA1

    6f4a2a30558cd95e49a3bf8c317929076fc6bc07

    SHA256

    ac4413e0b64ed34e521e3d97be2cd9de12d111b6e36d46570c6df9f039cccb2f

    SHA512

    29269adcf80d40afac6081945c2bb95e60d6673bf7a9244a8ea721efd8018a3f6f0c4c23132720874b33787ae17d078f1c3bde079fe631096152965c444e7098

  • memory/944-60-0x0000000000000000-mapping.dmp

  • memory/944-67-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/944-70-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1228-56-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1228-57-0x0000000075E11000-0x0000000075E13000-memory.dmp

    Filesize

    8KB

  • memory/1228-65-0x0000000002A20000-0x0000000002A6F000-memory.dmp

    Filesize

    316KB

  • memory/1228-66-0x0000000002A20000-0x0000000002A6F000-memory.dmp

    Filesize

    316KB

  • memory/1228-69-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB