Analysis

  • max time kernel
    231s
  • max time network
    239s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:19

General

  • Target

    2d8413b8e8eaeb757f75a29d5648fd5ff7799d1961bfbde5c8ca79bb5a9cf4a2.exe

  • Size

    184KB

  • MD5

    44abccdd4046e163e582a71628cc83b9

  • SHA1

    bd9a7231d1c6873cf53cfa062205d237fe58a236

  • SHA256

    2d8413b8e8eaeb757f75a29d5648fd5ff7799d1961bfbde5c8ca79bb5a9cf4a2

  • SHA512

    2d1c3bfec70480fb1268305716645a64cf8ddbd7e354ad88def35e518948c1f35e45835c51279b55a5207bd6833bea0a15d871ce0e150eadb7acae098d1fcee1

  • SSDEEP

    3072:u8Dg+HWoYTzCh46Knvmb7/D26ytQlw/Lg5q69srijEIS3A:0rpz6LKnvmb7/D26yQlw/Lg5qosri/Sw

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 42 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d8413b8e8eaeb757f75a29d5648fd5ff7799d1961bfbde5c8ca79bb5a9cf4a2.exe
    "C:\Users\Admin\AppData\Local\Temp\2d8413b8e8eaeb757f75a29d5648fd5ff7799d1961bfbde5c8ca79bb5a9cf4a2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\biiimay.exe
      "C:\Users\Admin\biiimay.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\biiimay.exe

    Filesize

    184KB

    MD5

    22154760f7cbb340cf05d11e4233d8cb

    SHA1

    efb713bbbf3ee68f01cb0ab3ce16a23afe1f2e2c

    SHA256

    760b44a9c08a6ddfc54753984c7512f454d7144ac685ebe8ab5f1c6c92dbd230

    SHA512

    0c6e8e7e6b05ae8684fd7a2488779cdb5dbd451ec2e696fab9d6c005cb9d7cfa20aacb8423fbef6ef6590f2cd663e99968329c962ee7ebcf1d30eeea49816223

  • C:\Users\Admin\biiimay.exe

    Filesize

    184KB

    MD5

    22154760f7cbb340cf05d11e4233d8cb

    SHA1

    efb713bbbf3ee68f01cb0ab3ce16a23afe1f2e2c

    SHA256

    760b44a9c08a6ddfc54753984c7512f454d7144ac685ebe8ab5f1c6c92dbd230

    SHA512

    0c6e8e7e6b05ae8684fd7a2488779cdb5dbd451ec2e696fab9d6c005cb9d7cfa20aacb8423fbef6ef6590f2cd663e99968329c962ee7ebcf1d30eeea49816223

  • \Users\Admin\biiimay.exe

    Filesize

    184KB

    MD5

    22154760f7cbb340cf05d11e4233d8cb

    SHA1

    efb713bbbf3ee68f01cb0ab3ce16a23afe1f2e2c

    SHA256

    760b44a9c08a6ddfc54753984c7512f454d7144ac685ebe8ab5f1c6c92dbd230

    SHA512

    0c6e8e7e6b05ae8684fd7a2488779cdb5dbd451ec2e696fab9d6c005cb9d7cfa20aacb8423fbef6ef6590f2cd663e99968329c962ee7ebcf1d30eeea49816223

  • \Users\Admin\biiimay.exe

    Filesize

    184KB

    MD5

    22154760f7cbb340cf05d11e4233d8cb

    SHA1

    efb713bbbf3ee68f01cb0ab3ce16a23afe1f2e2c

    SHA256

    760b44a9c08a6ddfc54753984c7512f454d7144ac685ebe8ab5f1c6c92dbd230

    SHA512

    0c6e8e7e6b05ae8684fd7a2488779cdb5dbd451ec2e696fab9d6c005cb9d7cfa20aacb8423fbef6ef6590f2cd663e99968329c962ee7ebcf1d30eeea49816223

  • memory/1116-59-0x0000000000000000-mapping.dmp

  • memory/1644-56-0x00000000763D1000-0x00000000763D3000-memory.dmp

    Filesize

    8KB