Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:17

General

  • Target

    1fb123934d4ddcaa1db22b91b1feb7b59b2db64eaeb2c7b14709f32d0c714e53.exe

  • Size

    208KB

  • MD5

    571002a47b78ab366a2031d9c0eba7e7

  • SHA1

    0b538a907be79ff578032cb1113c3c7b6d8fe837

  • SHA256

    1fb123934d4ddcaa1db22b91b1feb7b59b2db64eaeb2c7b14709f32d0c714e53

  • SHA512

    c5fd75a9afc5a09be642194b4a79638b968ce9fd5385f5feecb137551d8899f42a774706f547cf599e39e823b2608272404c85259809cc3ff0b2457afe684dde

  • SSDEEP

    3072:zL/ErSdOKkbHtInyG2mTmGQ9AphKElqUAD:zL/ErMAbHenyGH2aKAA

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fb123934d4ddcaa1db22b91b1feb7b59b2db64eaeb2c7b14709f32d0c714e53.exe
    "C:\Users\Admin\AppData\Local\Temp\1fb123934d4ddcaa1db22b91b1feb7b59b2db64eaeb2c7b14709f32d0c714e53.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\reaoboy.exe
      "C:\Users\Admin\reaoboy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\reaoboy.exe

    Filesize

    208KB

    MD5

    d4d0292283b97fbf1947b20560ab0c28

    SHA1

    fc95f02deb42581da39ac5ac53c15b95839e65c2

    SHA256

    d6ee274bcdedc4a12952fa08fe34159a107be6b948286d9fb6d893486288295c

    SHA512

    94a6274d573307020fdcdd9df29af22cc6fb5f2473d4b68abb287f594d42bd1110b1b8bae9b88764a36f17253b750f22c43c46d1c67c428e5c6824f4ff0b8fd4

  • C:\Users\Admin\reaoboy.exe

    Filesize

    208KB

    MD5

    d4d0292283b97fbf1947b20560ab0c28

    SHA1

    fc95f02deb42581da39ac5ac53c15b95839e65c2

    SHA256

    d6ee274bcdedc4a12952fa08fe34159a107be6b948286d9fb6d893486288295c

    SHA512

    94a6274d573307020fdcdd9df29af22cc6fb5f2473d4b68abb287f594d42bd1110b1b8bae9b88764a36f17253b750f22c43c46d1c67c428e5c6824f4ff0b8fd4

  • \Users\Admin\reaoboy.exe

    Filesize

    208KB

    MD5

    d4d0292283b97fbf1947b20560ab0c28

    SHA1

    fc95f02deb42581da39ac5ac53c15b95839e65c2

    SHA256

    d6ee274bcdedc4a12952fa08fe34159a107be6b948286d9fb6d893486288295c

    SHA512

    94a6274d573307020fdcdd9df29af22cc6fb5f2473d4b68abb287f594d42bd1110b1b8bae9b88764a36f17253b750f22c43c46d1c67c428e5c6824f4ff0b8fd4

  • \Users\Admin\reaoboy.exe

    Filesize

    208KB

    MD5

    d4d0292283b97fbf1947b20560ab0c28

    SHA1

    fc95f02deb42581da39ac5ac53c15b95839e65c2

    SHA256

    d6ee274bcdedc4a12952fa08fe34159a107be6b948286d9fb6d893486288295c

    SHA512

    94a6274d573307020fdcdd9df29af22cc6fb5f2473d4b68abb287f594d42bd1110b1b8bae9b88764a36f17253b750f22c43c46d1c67c428e5c6824f4ff0b8fd4

  • memory/940-59-0x0000000000000000-mapping.dmp

  • memory/1368-56-0x0000000074E41000-0x0000000074E43000-memory.dmp

    Filesize

    8KB