Analysis

  • max time kernel
    248s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:15

General

  • Target

    1b720c4ff748f45b527cd8a6b41b560c2514106492bc7867fd361be0eab9ce65.exe

  • Size

    152KB

  • MD5

    34a8816d73167010d0a2a066ca51da30

  • SHA1

    84f4fc8bd272965d0b831c8b5f5aebe01a2401bb

  • SHA256

    1b720c4ff748f45b527cd8a6b41b560c2514106492bc7867fd361be0eab9ce65

  • SHA512

    1bc40d63988ea7ab3afcb42afd23c7490d275a5f35557838076611d3a72ab289badb7a7341d0c39ee3932a339a5eb71431fc4a18f1b47b75a7a35616f9dfb062

  • SSDEEP

    3072:H3skvl3Po5+tTjFqV+t3DRGCKBiAKN4oQZiEue:VQ5+t8+NDR5AWW9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b720c4ff748f45b527cd8a6b41b560c2514106492bc7867fd361be0eab9ce65.exe
    "C:\Users\Admin\AppData\Local\Temp\1b720c4ff748f45b527cd8a6b41b560c2514106492bc7867fd361be0eab9ce65.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\hcboem.exe
      "C:\Users\Admin\hcboem.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hcboem.exe

    Filesize

    152KB

    MD5

    5d6dbfc59de3c1b8deeb8118cda0d34e

    SHA1

    d3e0bae3bece6fe9d7295d6f78e24af8dc0e24e7

    SHA256

    cdcb614ce6f3da3c6a3729dac8c17464fbb55120774136868bbe96faa5785b6e

    SHA512

    e6376ce17297137a9c32bbb5ba6253d2746869b4b858a96ca93c4adc855c1c60daa89a9b27f74404be977a501410bd1a038c314f2117de4d9fb417faff919f2b

  • C:\Users\Admin\hcboem.exe

    Filesize

    152KB

    MD5

    5d6dbfc59de3c1b8deeb8118cda0d34e

    SHA1

    d3e0bae3bece6fe9d7295d6f78e24af8dc0e24e7

    SHA256

    cdcb614ce6f3da3c6a3729dac8c17464fbb55120774136868bbe96faa5785b6e

    SHA512

    e6376ce17297137a9c32bbb5ba6253d2746869b4b858a96ca93c4adc855c1c60daa89a9b27f74404be977a501410bd1a038c314f2117de4d9fb417faff919f2b

  • \Users\Admin\hcboem.exe

    Filesize

    152KB

    MD5

    5d6dbfc59de3c1b8deeb8118cda0d34e

    SHA1

    d3e0bae3bece6fe9d7295d6f78e24af8dc0e24e7

    SHA256

    cdcb614ce6f3da3c6a3729dac8c17464fbb55120774136868bbe96faa5785b6e

    SHA512

    e6376ce17297137a9c32bbb5ba6253d2746869b4b858a96ca93c4adc855c1c60daa89a9b27f74404be977a501410bd1a038c314f2117de4d9fb417faff919f2b

  • \Users\Admin\hcboem.exe

    Filesize

    152KB

    MD5

    5d6dbfc59de3c1b8deeb8118cda0d34e

    SHA1

    d3e0bae3bece6fe9d7295d6f78e24af8dc0e24e7

    SHA256

    cdcb614ce6f3da3c6a3729dac8c17464fbb55120774136868bbe96faa5785b6e

    SHA512

    e6376ce17297137a9c32bbb5ba6253d2746869b4b858a96ca93c4adc855c1c60daa89a9b27f74404be977a501410bd1a038c314f2117de4d9fb417faff919f2b

  • memory/756-56-0x0000000074E61000-0x0000000074E63000-memory.dmp

    Filesize

    8KB

  • memory/1160-59-0x0000000000000000-mapping.dmp