Analysis

  • max time kernel
    151s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:18

General

  • Target

    7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe

  • Size

    224KB

  • MD5

    198c4ff11d5ba6d09b23d23eac7c1fc8

  • SHA1

    022dd063f2bbf27f96c4d6142e4386954f11ad2a

  • SHA256

    7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587

  • SHA512

    f7dd6617fcfd56e9e182ef9bb37e51cf8be764a26c5302460f458fc56e8ea602d1b1fd4d8cb08694e2473614d7426384c6ab7971830cf00638b4f6ed478fb9a8

  • SSDEEP

    3072:bb3N87hBQQoZV7l2mclfj4Uvx+9sNxu+2eRcKgsU61JkkX39RLrw4ySKUbax2+gr:nNXt74L76nrZ3y

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe
    "C:\Users\Admin\AppData\Local\Temp\7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\duiqie.exe
      "C:\Users\Admin\duiqie.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\duiqie.exe

    Filesize

    224KB

    MD5

    6a28b151bd629cbd63ab345b6b2611bf

    SHA1

    ab050215dcefd0021cebf956fbaff0f67f1a63be

    SHA256

    aab7512eb150727ad5e96408bb26dce504bb7a6a324288be8bfcc2cbba90f9cd

    SHA512

    1e3ee88bf7fa28e01ca31b1f6d8ec0590aaf3bdf1ea82a38825a6c13c7f2105a32bb0edb0ad898564671cd941f4034d851ff2d37d6f19b21261f44c84f501318

  • C:\Users\Admin\duiqie.exe

    Filesize

    224KB

    MD5

    6a28b151bd629cbd63ab345b6b2611bf

    SHA1

    ab050215dcefd0021cebf956fbaff0f67f1a63be

    SHA256

    aab7512eb150727ad5e96408bb26dce504bb7a6a324288be8bfcc2cbba90f9cd

    SHA512

    1e3ee88bf7fa28e01ca31b1f6d8ec0590aaf3bdf1ea82a38825a6c13c7f2105a32bb0edb0ad898564671cd941f4034d851ff2d37d6f19b21261f44c84f501318

  • \Users\Admin\duiqie.exe

    Filesize

    224KB

    MD5

    6a28b151bd629cbd63ab345b6b2611bf

    SHA1

    ab050215dcefd0021cebf956fbaff0f67f1a63be

    SHA256

    aab7512eb150727ad5e96408bb26dce504bb7a6a324288be8bfcc2cbba90f9cd

    SHA512

    1e3ee88bf7fa28e01ca31b1f6d8ec0590aaf3bdf1ea82a38825a6c13c7f2105a32bb0edb0ad898564671cd941f4034d851ff2d37d6f19b21261f44c84f501318

  • \Users\Admin\duiqie.exe

    Filesize

    224KB

    MD5

    6a28b151bd629cbd63ab345b6b2611bf

    SHA1

    ab050215dcefd0021cebf956fbaff0f67f1a63be

    SHA256

    aab7512eb150727ad5e96408bb26dce504bb7a6a324288be8bfcc2cbba90f9cd

    SHA512

    1e3ee88bf7fa28e01ca31b1f6d8ec0590aaf3bdf1ea82a38825a6c13c7f2105a32bb0edb0ad898564671cd941f4034d851ff2d37d6f19b21261f44c84f501318

  • memory/1532-59-0x0000000000000000-mapping.dmp

  • memory/1640-56-0x00000000757B1000-0x00000000757B3000-memory.dmp

    Filesize

    8KB