Analysis

  • max time kernel
    151s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:15

General

  • Target

    082db0fcf214997990a3d0dc3844439f6d98d165b4548bc5c9c56cf88c67b295.exe

  • Size

    180KB

  • MD5

    53718f0746a2f794488e2846cde52690

  • SHA1

    929507f75a18040d3d1467f29a2511bce9a4d7f9

  • SHA256

    082db0fcf214997990a3d0dc3844439f6d98d165b4548bc5c9c56cf88c67b295

  • SHA512

    16ad36f031fa7ed7121d9776ef17a09187be5ef90490183bc357dccc8dd19bc94c87f6c6c242aa2c7dc661a854edd31a6b8b311f009a90742dc9b92db5fc3a69

  • SSDEEP

    3072:KFKmn1MlttMFz8o+F334VSlkfoyHYb/zCHPEhg5JN8x+eDfcAuQPUS9rulhh:KF91MltKaJkHHYb/zCHPEhg5JN8x+eDs

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\082db0fcf214997990a3d0dc3844439f6d98d165b4548bc5c9c56cf88c67b295.exe
    "C:\Users\Admin\AppData\Local\Temp\082db0fcf214997990a3d0dc3844439f6d98d165b4548bc5c9c56cf88c67b295.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\xieef.exe
      "C:\Users\Admin\xieef.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xieef.exe

    Filesize

    180KB

    MD5

    7f5466a50885dd6820c3fad156cb4f57

    SHA1

    3ba79a700262d6834870f0f63e7d85a5e930fd8d

    SHA256

    aafecb599b8d7930edb5f04871bd955f61221c4f5df0bece711a33220a1cb636

    SHA512

    570550e6521af9947fca741596283007105a5f22f2e774e1e85fd0fffe3452d4b6d51159919850543f838a38eab45f0bab9ee6d3704334d8471617237c9ab380

  • C:\Users\Admin\xieef.exe

    Filesize

    180KB

    MD5

    7f5466a50885dd6820c3fad156cb4f57

    SHA1

    3ba79a700262d6834870f0f63e7d85a5e930fd8d

    SHA256

    aafecb599b8d7930edb5f04871bd955f61221c4f5df0bece711a33220a1cb636

    SHA512

    570550e6521af9947fca741596283007105a5f22f2e774e1e85fd0fffe3452d4b6d51159919850543f838a38eab45f0bab9ee6d3704334d8471617237c9ab380

  • \Users\Admin\xieef.exe

    Filesize

    180KB

    MD5

    7f5466a50885dd6820c3fad156cb4f57

    SHA1

    3ba79a700262d6834870f0f63e7d85a5e930fd8d

    SHA256

    aafecb599b8d7930edb5f04871bd955f61221c4f5df0bece711a33220a1cb636

    SHA512

    570550e6521af9947fca741596283007105a5f22f2e774e1e85fd0fffe3452d4b6d51159919850543f838a38eab45f0bab9ee6d3704334d8471617237c9ab380

  • \Users\Admin\xieef.exe

    Filesize

    180KB

    MD5

    7f5466a50885dd6820c3fad156cb4f57

    SHA1

    3ba79a700262d6834870f0f63e7d85a5e930fd8d

    SHA256

    aafecb599b8d7930edb5f04871bd955f61221c4f5df0bece711a33220a1cb636

    SHA512

    570550e6521af9947fca741596283007105a5f22f2e774e1e85fd0fffe3452d4b6d51159919850543f838a38eab45f0bab9ee6d3704334d8471617237c9ab380

  • memory/1760-56-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB

  • memory/2040-59-0x0000000000000000-mapping.dmp