Analysis

  • max time kernel
    151s
  • max time network
    85s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:19

General

  • Target

    128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe

  • Size

    200KB

  • MD5

    171309d0b1e8485725d1cd60c0d115d0

  • SHA1

    19cdb5aa195be013205755ff6b8d620a41d31cf9

  • SHA256

    128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304

  • SHA512

    8722f7529cb5ecdc764d1d7e11af17c39de63108588ac76fc1ad383e913aa632a781a886d3b99f956720c0ee3ecf624756164e268b75166ac6a071d3fad7f371

  • SSDEEP

    3072:mP9S1kZ8jprujIivwslnsn9+JuJbfoL2wVHTZhQTWVyc+LpfJQlKTQC4wq:i9SOvwslnsn9+JuJbfoL2wVH9eI+NJWB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe
    "C:\Users\Admin\AppData\Local\Temp\128fae4806ed9cefa6b8299ab83105a3790e841fe702a3ce2430b3543949b304.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\kaece.exe
      "C:\Users\Admin\kaece.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kaece.exe

    Filesize

    200KB

    MD5

    d297ad42525d97d7ab98d680025ef773

    SHA1

    eb08c065fa4d0080b6c967b43b07c58aa91626e2

    SHA256

    7bb64bb8abb59edddaa63db0698d6e9f6711188015e69181ae6f0a1847baa35e

    SHA512

    dc1260a1b8da3d7e3ea6689b0c9bf4ab94aba9e5eb5e8a41c1f112f63cb7a48606f0e6c4dc0e63dd16d687c2bcec988b36c1fdcc714cfe61fa196b8ae3a10f50

  • C:\Users\Admin\kaece.exe

    Filesize

    200KB

    MD5

    d297ad42525d97d7ab98d680025ef773

    SHA1

    eb08c065fa4d0080b6c967b43b07c58aa91626e2

    SHA256

    7bb64bb8abb59edddaa63db0698d6e9f6711188015e69181ae6f0a1847baa35e

    SHA512

    dc1260a1b8da3d7e3ea6689b0c9bf4ab94aba9e5eb5e8a41c1f112f63cb7a48606f0e6c4dc0e63dd16d687c2bcec988b36c1fdcc714cfe61fa196b8ae3a10f50

  • \Users\Admin\kaece.exe

    Filesize

    200KB

    MD5

    d297ad42525d97d7ab98d680025ef773

    SHA1

    eb08c065fa4d0080b6c967b43b07c58aa91626e2

    SHA256

    7bb64bb8abb59edddaa63db0698d6e9f6711188015e69181ae6f0a1847baa35e

    SHA512

    dc1260a1b8da3d7e3ea6689b0c9bf4ab94aba9e5eb5e8a41c1f112f63cb7a48606f0e6c4dc0e63dd16d687c2bcec988b36c1fdcc714cfe61fa196b8ae3a10f50

  • \Users\Admin\kaece.exe

    Filesize

    200KB

    MD5

    d297ad42525d97d7ab98d680025ef773

    SHA1

    eb08c065fa4d0080b6c967b43b07c58aa91626e2

    SHA256

    7bb64bb8abb59edddaa63db0698d6e9f6711188015e69181ae6f0a1847baa35e

    SHA512

    dc1260a1b8da3d7e3ea6689b0c9bf4ab94aba9e5eb5e8a41c1f112f63cb7a48606f0e6c4dc0e63dd16d687c2bcec988b36c1fdcc714cfe61fa196b8ae3a10f50

  • memory/984-59-0x0000000000000000-mapping.dmp

  • memory/1720-56-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

    Filesize

    8KB