Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:56

General

  • Target

    a2c18d449aaf2c0ee899af7402169129b14a5c0fc5f36cd84566a0f3f19797d7.exe

  • Size

    232KB

  • MD5

    43fe0ce228af0cd94c860aac6329a700

  • SHA1

    d526fb075fb0e1258afdc74486199d5706af93ad

  • SHA256

    a2c18d449aaf2c0ee899af7402169129b14a5c0fc5f36cd84566a0f3f19797d7

  • SHA512

    24203efc0e558cdcdbdf4dc14e69fc3fac42c4dd37a474fadbd6924a6568fd93fbf00c8b7627017115d6c68b94e7fd1b4eb08b06ed406d70f9fb4142339f71e1

  • SSDEEP

    3072:bD64wfWRrIMNRlZ62Pal2LBJXmzOHm5WZ3K+MCEFqTcWEyxeL2mDHLz/5L5DEr6s:H6zepp3PJXCOGY3eNFRFyMdL5DEr6Ul

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2c18d449aaf2c0ee899af7402169129b14a5c0fc5f36cd84566a0f3f19797d7.exe
    "C:\Users\Admin\AppData\Local\Temp\a2c18d449aaf2c0ee899af7402169129b14a5c0fc5f36cd84566a0f3f19797d7.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\guikuad.exe
      "C:\Users\Admin\guikuad.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\guikuad.exe

    Filesize

    232KB

    MD5

    a06a6c5ef424aa60dd54d4b8c06da2f6

    SHA1

    0769551bf2efccec129bccd9827e97d8739203f2

    SHA256

    32ee9cc0c96de8e922761ca616f046ea9bfff176634a87713453966c9f8eae97

    SHA512

    3f0fa5864ba14946c77bf203624e78dbf1c698fe65196dbcba2bf3ce5c232c8d156becff563d96b4e88ee23043ecee3250694f2ac5c5fb7b7f1754c17cc77532

  • C:\Users\Admin\guikuad.exe

    Filesize

    232KB

    MD5

    a06a6c5ef424aa60dd54d4b8c06da2f6

    SHA1

    0769551bf2efccec129bccd9827e97d8739203f2

    SHA256

    32ee9cc0c96de8e922761ca616f046ea9bfff176634a87713453966c9f8eae97

    SHA512

    3f0fa5864ba14946c77bf203624e78dbf1c698fe65196dbcba2bf3ce5c232c8d156becff563d96b4e88ee23043ecee3250694f2ac5c5fb7b7f1754c17cc77532

  • \Users\Admin\guikuad.exe

    Filesize

    232KB

    MD5

    a06a6c5ef424aa60dd54d4b8c06da2f6

    SHA1

    0769551bf2efccec129bccd9827e97d8739203f2

    SHA256

    32ee9cc0c96de8e922761ca616f046ea9bfff176634a87713453966c9f8eae97

    SHA512

    3f0fa5864ba14946c77bf203624e78dbf1c698fe65196dbcba2bf3ce5c232c8d156becff563d96b4e88ee23043ecee3250694f2ac5c5fb7b7f1754c17cc77532

  • \Users\Admin\guikuad.exe

    Filesize

    232KB

    MD5

    a06a6c5ef424aa60dd54d4b8c06da2f6

    SHA1

    0769551bf2efccec129bccd9827e97d8739203f2

    SHA256

    32ee9cc0c96de8e922761ca616f046ea9bfff176634a87713453966c9f8eae97

    SHA512

    3f0fa5864ba14946c77bf203624e78dbf1c698fe65196dbcba2bf3ce5c232c8d156becff563d96b4e88ee23043ecee3250694f2ac5c5fb7b7f1754c17cc77532

  • memory/1372-59-0x0000000000000000-mapping.dmp

  • memory/1428-56-0x0000000075071000-0x0000000075073000-memory.dmp

    Filesize

    8KB