Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:20

General

  • Target

    778d6eed4658765a77114cbcb0753cc8a46f340e46f301619a498bfa019f00de.exe

  • Size

    180KB

  • MD5

    262d9a79b761f4a8cdca89efb15d96a0

  • SHA1

    0b209933de146800935542249a4f7535818b017f

  • SHA256

    778d6eed4658765a77114cbcb0753cc8a46f340e46f301619a498bfa019f00de

  • SHA512

    60a8c1065404a718416ebfd70bf9a7d9b301c9585a43f84da342aa19dd83c2cee9bf0e128640f14f610209dbc18dd87ff16628ce6aee7c59188f6443aae37feb

  • SSDEEP

    3072:KFKvr1MlttMFz8o+F334VSlkfoyHYb/zCHPEhg5JN8x+eDfcAuQPUSYrulWi:KFW1MltKaJkHHYb/zCHPEhg5JN8x+eDD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\778d6eed4658765a77114cbcb0753cc8a46f340e46f301619a498bfa019f00de.exe
    "C:\Users\Admin\AppData\Local\Temp\778d6eed4658765a77114cbcb0753cc8a46f340e46f301619a498bfa019f00de.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\mhjoev.exe
      "C:\Users\Admin\mhjoev.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\mhjoev.exe

    Filesize

    180KB

    MD5

    0ef2717a55b520885e906012a425080b

    SHA1

    410165943b5e69ba6556af5bd4baa7aa5889f4b0

    SHA256

    19a288971438b42c4e2a4ab8bc062326fa4d487d93c284d7babf994dec628657

    SHA512

    87c08fd5caa44efcc542c3cbc9a698599d940ebd94a0f3a737f69535ad0132a0f3b31721547284c38b7f247760a8751f6f42d74923e4cecdab075faad5b4cd16

  • C:\Users\Admin\mhjoev.exe

    Filesize

    180KB

    MD5

    0ef2717a55b520885e906012a425080b

    SHA1

    410165943b5e69ba6556af5bd4baa7aa5889f4b0

    SHA256

    19a288971438b42c4e2a4ab8bc062326fa4d487d93c284d7babf994dec628657

    SHA512

    87c08fd5caa44efcc542c3cbc9a698599d940ebd94a0f3a737f69535ad0132a0f3b31721547284c38b7f247760a8751f6f42d74923e4cecdab075faad5b4cd16

  • \Users\Admin\mhjoev.exe

    Filesize

    180KB

    MD5

    0ef2717a55b520885e906012a425080b

    SHA1

    410165943b5e69ba6556af5bd4baa7aa5889f4b0

    SHA256

    19a288971438b42c4e2a4ab8bc062326fa4d487d93c284d7babf994dec628657

    SHA512

    87c08fd5caa44efcc542c3cbc9a698599d940ebd94a0f3a737f69535ad0132a0f3b31721547284c38b7f247760a8751f6f42d74923e4cecdab075faad5b4cd16

  • \Users\Admin\mhjoev.exe

    Filesize

    180KB

    MD5

    0ef2717a55b520885e906012a425080b

    SHA1

    410165943b5e69ba6556af5bd4baa7aa5889f4b0

    SHA256

    19a288971438b42c4e2a4ab8bc062326fa4d487d93c284d7babf994dec628657

    SHA512

    87c08fd5caa44efcc542c3cbc9a698599d940ebd94a0f3a737f69535ad0132a0f3b31721547284c38b7f247760a8751f6f42d74923e4cecdab075faad5b4cd16

  • memory/844-59-0x0000000000000000-mapping.dmp

  • memory/1444-56-0x0000000075D71000-0x0000000075D73000-memory.dmp

    Filesize

    8KB