Analysis

  • max time kernel
    151s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:16

General

  • Target

    1da70ebedfd09c950b6ba8a5634fedd32a934df397d5c55679b0164e0f7aa99c.exe

  • Size

    260KB

  • MD5

    03adf1bb9cdf0d837f18c1dc12db0c52

  • SHA1

    b61134f4402b622163b226e9559518d770747762

  • SHA256

    1da70ebedfd09c950b6ba8a5634fedd32a934df397d5c55679b0164e0f7aa99c

  • SHA512

    ff224b92542289c8182c2d4fdf65e81d449dd0be67245e331746d8c2c0dbc365480baf09212888b81b9168b197e49c2f03474a72e5be8b35150da71b2714be89

  • SSDEEP

    3072:gsgZWWTiooHiUS41IGymUU5fkUehyB456J2Lw6BoiEx4PvsL2o5n33ygoe:rOToHiUBiGyuT236J2deiEx4PvRo53Fv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1da70ebedfd09c950b6ba8a5634fedd32a934df397d5c55679b0164e0f7aa99c.exe
    "C:\Users\Admin\AppData\Local\Temp\1da70ebedfd09c950b6ba8a5634fedd32a934df397d5c55679b0164e0f7aa99c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Users\Admin\cwpif.exe
      "C:\Users\Admin\cwpif.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2044

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\cwpif.exe
    Filesize

    260KB

    MD5

    5c8a0a4faa640c991bbdfa9166d356e5

    SHA1

    405ad400ca4a6b85d95a7052db9441f70ace0a46

    SHA256

    141f7fa6690abf3feb62b109bdfe84f5503226ed9584b68f6d50c59a4c49151e

    SHA512

    e58c52a1b1b3e454175acb4851c89c63deb092d1ed9f4a83e7a6afd1202c5c29d89a1b7f2dee39c2f91a9c69b82744880601a5fe4d4525c4a08b80a6abc5bba9

  • C:\Users\Admin\cwpif.exe
    Filesize

    260KB

    MD5

    5c8a0a4faa640c991bbdfa9166d356e5

    SHA1

    405ad400ca4a6b85d95a7052db9441f70ace0a46

    SHA256

    141f7fa6690abf3feb62b109bdfe84f5503226ed9584b68f6d50c59a4c49151e

    SHA512

    e58c52a1b1b3e454175acb4851c89c63deb092d1ed9f4a83e7a6afd1202c5c29d89a1b7f2dee39c2f91a9c69b82744880601a5fe4d4525c4a08b80a6abc5bba9

  • \Users\Admin\cwpif.exe
    Filesize

    260KB

    MD5

    5c8a0a4faa640c991bbdfa9166d356e5

    SHA1

    405ad400ca4a6b85d95a7052db9441f70ace0a46

    SHA256

    141f7fa6690abf3feb62b109bdfe84f5503226ed9584b68f6d50c59a4c49151e

    SHA512

    e58c52a1b1b3e454175acb4851c89c63deb092d1ed9f4a83e7a6afd1202c5c29d89a1b7f2dee39c2f91a9c69b82744880601a5fe4d4525c4a08b80a6abc5bba9

  • \Users\Admin\cwpif.exe
    Filesize

    260KB

    MD5

    5c8a0a4faa640c991bbdfa9166d356e5

    SHA1

    405ad400ca4a6b85d95a7052db9441f70ace0a46

    SHA256

    141f7fa6690abf3feb62b109bdfe84f5503226ed9584b68f6d50c59a4c49151e

    SHA512

    e58c52a1b1b3e454175acb4851c89c63deb092d1ed9f4a83e7a6afd1202c5c29d89a1b7f2dee39c2f91a9c69b82744880601a5fe4d4525c4a08b80a6abc5bba9

  • memory/1416-56-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/1416-57-0x0000000074DC1000-0x0000000074DC3000-memory.dmp
    Filesize

    8KB

  • memory/1416-65-0x0000000002CB0000-0x0000000002CF2000-memory.dmp
    Filesize

    264KB

  • memory/1416-66-0x0000000002CB0000-0x0000000002CF2000-memory.dmp
    Filesize

    264KB

  • memory/1416-69-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/2044-60-0x0000000000000000-mapping.dmp
  • memory/2044-67-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/2044-70-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB