Analysis

  • max time kernel
    187s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:22

General

  • Target

    dbdf7b683bea974b797ba8c3672936ec0ab7f1abfbebb59f53562ebe8b226d99.exe

  • Size

    304KB

  • MD5

    164a65df4589670ee1b78d2c93c6f581

  • SHA1

    b0be5ac0fb8d0f17045872f00183e1c9e1d92cdd

  • SHA256

    dbdf7b683bea974b797ba8c3672936ec0ab7f1abfbebb59f53562ebe8b226d99

  • SHA512

    b69080df8215b155d0afa68cef820e080729f0cb27ca9b29570dd71bc3bf625519e8a5eb436ceec3fa52b12a84aab6e3ad7d1ea1ef8418c83680c39bf89cdba8

  • SSDEEP

    6144:MuK76frBNCLd6eIpAtX3r34KwUQ63owH1VMn3Nh2x:TKoBNCLd6eIpAJ3T4KB3owHXMn3NhU

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 47 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbdf7b683bea974b797ba8c3672936ec0ab7f1abfbebb59f53562ebe8b226d99.exe
    "C:\Users\Admin\AppData\Local\Temp\dbdf7b683bea974b797ba8c3672936ec0ab7f1abfbebb59f53562ebe8b226d99.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\vaemou.exe
      "C:\Users\Admin\vaemou.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vaemou.exe

    Filesize

    304KB

    MD5

    9b0e80a23f2ee21c79a86caa938e3e34

    SHA1

    81cab7220372f7297416af58f5b25f5f90685375

    SHA256

    cebb93480be54b4e56bd361e1da2c241199d959bc4bc4839b458ca6337a08d86

    SHA512

    86bd7a5d1f2c52e02f9a604adc37eea46206b42c7384144b3600606c6022a9246abc4ab3bd75ff161be4587220d2674c60ddca9943180bf59dc1addd033e12eb

  • C:\Users\Admin\vaemou.exe

    Filesize

    304KB

    MD5

    9b0e80a23f2ee21c79a86caa938e3e34

    SHA1

    81cab7220372f7297416af58f5b25f5f90685375

    SHA256

    cebb93480be54b4e56bd361e1da2c241199d959bc4bc4839b458ca6337a08d86

    SHA512

    86bd7a5d1f2c52e02f9a604adc37eea46206b42c7384144b3600606c6022a9246abc4ab3bd75ff161be4587220d2674c60ddca9943180bf59dc1addd033e12eb

  • \Users\Admin\vaemou.exe

    Filesize

    304KB

    MD5

    9b0e80a23f2ee21c79a86caa938e3e34

    SHA1

    81cab7220372f7297416af58f5b25f5f90685375

    SHA256

    cebb93480be54b4e56bd361e1da2c241199d959bc4bc4839b458ca6337a08d86

    SHA512

    86bd7a5d1f2c52e02f9a604adc37eea46206b42c7384144b3600606c6022a9246abc4ab3bd75ff161be4587220d2674c60ddca9943180bf59dc1addd033e12eb

  • \Users\Admin\vaemou.exe

    Filesize

    304KB

    MD5

    9b0e80a23f2ee21c79a86caa938e3e34

    SHA1

    81cab7220372f7297416af58f5b25f5f90685375

    SHA256

    cebb93480be54b4e56bd361e1da2c241199d959bc4bc4839b458ca6337a08d86

    SHA512

    86bd7a5d1f2c52e02f9a604adc37eea46206b42c7384144b3600606c6022a9246abc4ab3bd75ff161be4587220d2674c60ddca9943180bf59dc1addd033e12eb

  • memory/676-59-0x0000000000000000-mapping.dmp

  • memory/2040-56-0x0000000076381000-0x0000000076383000-memory.dmp

    Filesize

    8KB