Analysis

  • max time kernel
    151s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:50

General

  • Target

    3d5cd7abb7a366ab2bd7fa19512b5e5cfb606a9d2405bee5262c3cecd1e421dc.exe

  • Size

    252KB

  • MD5

    4ac1afd1d94d25e4495c8290591f4020

  • SHA1

    fbaed259b8a0a3ee435fe8b5a307aa14fb2b7c2a

  • SHA256

    3d5cd7abb7a366ab2bd7fa19512b5e5cfb606a9d2405bee5262c3cecd1e421dc

  • SHA512

    88da364ef35092c553698f7fa8dd6c8439198c875e19b9a1c1410e4196e42cbc06987bc67620ee5d63e9c35b6d105227bf4eeda6aa3d18e06f8b08f7e26600cc

  • SSDEEP

    3072:grAc+x7LaShsNvZ0OgRqTAJcLGGO/xuiEyJeOOeGs5oxnkNzQKtjQx:grghCx/ZLA4PmG6dK

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 43 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d5cd7abb7a366ab2bd7fa19512b5e5cfb606a9d2405bee5262c3cecd1e421dc.exe
    "C:\Users\Admin\AppData\Local\Temp\3d5cd7abb7a366ab2bd7fa19512b5e5cfb606a9d2405bee5262c3cecd1e421dc.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\sioohul.exe
      "C:\Users\Admin\sioohul.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\sioohul.exe

    Filesize

    252KB

    MD5

    107635b680e606446bbd7a92c8a38282

    SHA1

    c28ddaa9bea85e3307b4ddf14ff84f4acaf52236

    SHA256

    f47a80c3166619a226c6950aa1c0c5e7c43ef9d04728f6d8c277a064d5e4e41f

    SHA512

    c5eb88c573fb6b7d43097fad0cadb92356a992dba950104f582376eac7be977e16bcf5aa45e27e370cc8d2d3277179180a479708cdb32a33ccc35a909904a5de

  • C:\Users\Admin\sioohul.exe

    Filesize

    252KB

    MD5

    107635b680e606446bbd7a92c8a38282

    SHA1

    c28ddaa9bea85e3307b4ddf14ff84f4acaf52236

    SHA256

    f47a80c3166619a226c6950aa1c0c5e7c43ef9d04728f6d8c277a064d5e4e41f

    SHA512

    c5eb88c573fb6b7d43097fad0cadb92356a992dba950104f582376eac7be977e16bcf5aa45e27e370cc8d2d3277179180a479708cdb32a33ccc35a909904a5de

  • \Users\Admin\sioohul.exe

    Filesize

    252KB

    MD5

    107635b680e606446bbd7a92c8a38282

    SHA1

    c28ddaa9bea85e3307b4ddf14ff84f4acaf52236

    SHA256

    f47a80c3166619a226c6950aa1c0c5e7c43ef9d04728f6d8c277a064d5e4e41f

    SHA512

    c5eb88c573fb6b7d43097fad0cadb92356a992dba950104f582376eac7be977e16bcf5aa45e27e370cc8d2d3277179180a479708cdb32a33ccc35a909904a5de

  • \Users\Admin\sioohul.exe

    Filesize

    252KB

    MD5

    107635b680e606446bbd7a92c8a38282

    SHA1

    c28ddaa9bea85e3307b4ddf14ff84f4acaf52236

    SHA256

    f47a80c3166619a226c6950aa1c0c5e7c43ef9d04728f6d8c277a064d5e4e41f

    SHA512

    c5eb88c573fb6b7d43097fad0cadb92356a992dba950104f582376eac7be977e16bcf5aa45e27e370cc8d2d3277179180a479708cdb32a33ccc35a909904a5de

  • memory/1816-59-0x0000000000000000-mapping.dmp

  • memory/1960-56-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB