Analysis

  • max time kernel
    152s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:16

General

  • Target

    7af48b9e159d3548a04b31821c503f643206fa4d9467eb653ff7041ea0cb5c1b.exe

  • Size

    256KB

  • MD5

    2d806efa292017252db826edf6caa020

  • SHA1

    5893e6be349b2048b34d749a77b473a1f17d3cc9

  • SHA256

    7af48b9e159d3548a04b31821c503f643206fa4d9467eb653ff7041ea0cb5c1b

  • SHA512

    5697a57935f4efa4da9f688b313a52a24fd40bed1de09ab9033578472ab822a8533c12caed5b9c2dcb893c6aa83727977c92bfbd0f394d4f4744459ac1c9a218

  • SSDEEP

    6144:yf28PlptNvl9fm0UBFsqMabeYiUDogmFv:y39n9lJvaFsqMvNv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7af48b9e159d3548a04b31821c503f643206fa4d9467eb653ff7041ea0cb5c1b.exe
    "C:\Users\Admin\AppData\Local\Temp\7af48b9e159d3548a04b31821c503f643206fa4d9467eb653ff7041ea0cb5c1b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\ftsop.exe
      "C:\Users\Admin\ftsop.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ftsop.exe

    Filesize

    256KB

    MD5

    c069efcafa7a78588d8cec5005929997

    SHA1

    2ad5f1b7b085d640601723125bfe2b8fddbab6fd

    SHA256

    c304eafa9fd9400c0e6846574f1fa2b2dc3b1e0ca78c0c7ad2b03d14b1fba326

    SHA512

    90f636a0a52fc0e4cb4f465c6676285b9a84bbfd033856b3bf877c40d688d3a60d0a8315086752290f5793a1459820ae957a58f63610e07dcad4022afd452597

  • C:\Users\Admin\ftsop.exe

    Filesize

    256KB

    MD5

    c069efcafa7a78588d8cec5005929997

    SHA1

    2ad5f1b7b085d640601723125bfe2b8fddbab6fd

    SHA256

    c304eafa9fd9400c0e6846574f1fa2b2dc3b1e0ca78c0c7ad2b03d14b1fba326

    SHA512

    90f636a0a52fc0e4cb4f465c6676285b9a84bbfd033856b3bf877c40d688d3a60d0a8315086752290f5793a1459820ae957a58f63610e07dcad4022afd452597

  • \Users\Admin\ftsop.exe

    Filesize

    256KB

    MD5

    c069efcafa7a78588d8cec5005929997

    SHA1

    2ad5f1b7b085d640601723125bfe2b8fddbab6fd

    SHA256

    c304eafa9fd9400c0e6846574f1fa2b2dc3b1e0ca78c0c7ad2b03d14b1fba326

    SHA512

    90f636a0a52fc0e4cb4f465c6676285b9a84bbfd033856b3bf877c40d688d3a60d0a8315086752290f5793a1459820ae957a58f63610e07dcad4022afd452597

  • \Users\Admin\ftsop.exe

    Filesize

    256KB

    MD5

    c069efcafa7a78588d8cec5005929997

    SHA1

    2ad5f1b7b085d640601723125bfe2b8fddbab6fd

    SHA256

    c304eafa9fd9400c0e6846574f1fa2b2dc3b1e0ca78c0c7ad2b03d14b1fba326

    SHA512

    90f636a0a52fc0e4cb4f465c6676285b9a84bbfd033856b3bf877c40d688d3a60d0a8315086752290f5793a1459820ae957a58f63610e07dcad4022afd452597

  • memory/1568-59-0x0000000000000000-mapping.dmp

  • memory/1948-56-0x0000000076031000-0x0000000076033000-memory.dmp

    Filesize

    8KB