Analysis

  • max time kernel
    152s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:21

General

  • Target

    b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe

  • Size

    252KB

  • MD5

    0539065b43e4e75d5e100593dd034f36

  • SHA1

    bb173ebb6ebd0c1d47215c78647a539a70526632

  • SHA256

    b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9

  • SHA512

    d7d293c47862adf0f2789cd22304340cb7ca6db495883bac99e515941825b76abb04ca7cb637cc062d4c869594b778d81266eaab7d51bee5c55e80b437f38d21

  • SSDEEP

    6144:Orh0e5rhVz84rjL1/gq0n74Gp+QFbLVBvOP+c+EdMUutF:+h0KrhK4rjL1/gq0n74Gp+QFbLV0+RUa

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe
    "C:\Users\Admin\AppData\Local\Temp\b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\noikio.exe
      "C:\Users\Admin\noikio.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\noikio.exe

    Filesize

    252KB

    MD5

    8c07019dfbb143f103ad108eef93103b

    SHA1

    394c2b21738ca739e8d3c00f36938171cd4b17a1

    SHA256

    b9168016add6c87dfd36fe04449b87866d7444320271f5dcf1b4d7ee77a076ce

    SHA512

    b275c18378218e09b84228abcf4885aad5b7a96e7f833f0bb9cd32ddd73450fd65395a9dc22da039b3f6c27d792d70642ffdf68ec1b3964dd9fc9a7fe1bef52e

  • C:\Users\Admin\noikio.exe

    Filesize

    252KB

    MD5

    8c07019dfbb143f103ad108eef93103b

    SHA1

    394c2b21738ca739e8d3c00f36938171cd4b17a1

    SHA256

    b9168016add6c87dfd36fe04449b87866d7444320271f5dcf1b4d7ee77a076ce

    SHA512

    b275c18378218e09b84228abcf4885aad5b7a96e7f833f0bb9cd32ddd73450fd65395a9dc22da039b3f6c27d792d70642ffdf68ec1b3964dd9fc9a7fe1bef52e

  • \Users\Admin\noikio.exe

    Filesize

    252KB

    MD5

    8c07019dfbb143f103ad108eef93103b

    SHA1

    394c2b21738ca739e8d3c00f36938171cd4b17a1

    SHA256

    b9168016add6c87dfd36fe04449b87866d7444320271f5dcf1b4d7ee77a076ce

    SHA512

    b275c18378218e09b84228abcf4885aad5b7a96e7f833f0bb9cd32ddd73450fd65395a9dc22da039b3f6c27d792d70642ffdf68ec1b3964dd9fc9a7fe1bef52e

  • \Users\Admin\noikio.exe

    Filesize

    252KB

    MD5

    8c07019dfbb143f103ad108eef93103b

    SHA1

    394c2b21738ca739e8d3c00f36938171cd4b17a1

    SHA256

    b9168016add6c87dfd36fe04449b87866d7444320271f5dcf1b4d7ee77a076ce

    SHA512

    b275c18378218e09b84228abcf4885aad5b7a96e7f833f0bb9cd32ddd73450fd65395a9dc22da039b3f6c27d792d70642ffdf68ec1b3964dd9fc9a7fe1bef52e

  • memory/1120-56-0x0000000075291000-0x0000000075293000-memory.dmp

    Filesize

    8KB

  • memory/1712-59-0x0000000000000000-mapping.dmp