Analysis

  • max time kernel
    171s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:39

General

  • Target

    658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe

  • Size

    196KB

  • MD5

    2bc9aef0289d6c160dc0bee8a6b42781

  • SHA1

    70b28036174d2822601458c1670b97da3625e491

  • SHA256

    658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934

  • SHA512

    11e7cb4aac9f61c2755116cbc8e829e3cbeaa911df66dbb7817f6ed6b901d69e204b09356aa41d81b9dbe8f2568c166861d10af45faabce5a5a778e5c0144236

  • SSDEEP

    6144:+c14K16oTJWvfU4+bOl8femcK/fObT/bGimszUf7Wq3:b3AoTMvs4+bOlNK/fObT/bGipE7F

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe
    "C:\Users\Admin\AppData\Local\Temp\658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\cuanuv.exe
      "C:\Users\Admin\cuanuv.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\cuanuv.exe

    Filesize

    196KB

    MD5

    11c205649b3396f765df0e7e3fe53b95

    SHA1

    50c0fb128f4dfc93f190abcb0b52fd9604098906

    SHA256

    89d3fecff8c736921e0741df5aafba8933520ffdee94cbdd1da479478d528fe7

    SHA512

    93dd7fb0f0adccf85a2d5060d9efe3208d24d02b403c5dcd4eb93cda5471d1336a70d61720af7e17d239b63ef3a78a4fee275f1e878a945a88454bff309d7a14

  • C:\Users\Admin\cuanuv.exe

    Filesize

    196KB

    MD5

    11c205649b3396f765df0e7e3fe53b95

    SHA1

    50c0fb128f4dfc93f190abcb0b52fd9604098906

    SHA256

    89d3fecff8c736921e0741df5aafba8933520ffdee94cbdd1da479478d528fe7

    SHA512

    93dd7fb0f0adccf85a2d5060d9efe3208d24d02b403c5dcd4eb93cda5471d1336a70d61720af7e17d239b63ef3a78a4fee275f1e878a945a88454bff309d7a14

  • \Users\Admin\cuanuv.exe

    Filesize

    196KB

    MD5

    11c205649b3396f765df0e7e3fe53b95

    SHA1

    50c0fb128f4dfc93f190abcb0b52fd9604098906

    SHA256

    89d3fecff8c736921e0741df5aafba8933520ffdee94cbdd1da479478d528fe7

    SHA512

    93dd7fb0f0adccf85a2d5060d9efe3208d24d02b403c5dcd4eb93cda5471d1336a70d61720af7e17d239b63ef3a78a4fee275f1e878a945a88454bff309d7a14

  • \Users\Admin\cuanuv.exe

    Filesize

    196KB

    MD5

    11c205649b3396f765df0e7e3fe53b95

    SHA1

    50c0fb128f4dfc93f190abcb0b52fd9604098906

    SHA256

    89d3fecff8c736921e0741df5aafba8933520ffdee94cbdd1da479478d528fe7

    SHA512

    93dd7fb0f0adccf85a2d5060d9efe3208d24d02b403c5dcd4eb93cda5471d1336a70d61720af7e17d239b63ef3a78a4fee275f1e878a945a88454bff309d7a14

  • memory/1180-59-0x0000000000000000-mapping.dmp

  • memory/1188-56-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB