Analysis

  • max time kernel
    183s
  • max time network
    207s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:24

General

  • Target

    f2e2618a8bf54138e8b514cecabae131a84384b3d3807386b165327c5394b251.exe

  • Size

    276KB

  • MD5

    345cd7136fdb2e6b2fea761e6ef19c35

  • SHA1

    58fb1c60503d26a1b71bb79d3fb8c39a0a202e89

  • SHA256

    f2e2618a8bf54138e8b514cecabae131a84384b3d3807386b165327c5394b251

  • SHA512

    64f8b6908ee3322c775eac04157365efe5bb7c6e1fabca7cd5d05358deda75fffcc5e803066dbb492e355f3c319747f83657fef2013d85157530fb0b98864668

  • SSDEEP

    3072:+dZJa8ix7vUPDzaqBAyQsSNTlMKmmo4xTbWI+QV7Ir//5F5m7wuUBctUAe7:ga5xmtAy+JlbxbWIsr/B7mscSd7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2e2618a8bf54138e8b514cecabae131a84384b3d3807386b165327c5394b251.exe
    "C:\Users\Admin\AppData\Local\Temp\f2e2618a8bf54138e8b514cecabae131a84384b3d3807386b165327c5394b251.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\reuowet.exe
      "C:\Users\Admin\reuowet.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\reuowet.exe

    Filesize

    276KB

    MD5

    c04cc946bf2175fa844cdeef10a85910

    SHA1

    0ba1972658d8c5c893468e6495ad38c5ceac57cf

    SHA256

    b8c5dcd384dca4b198e57bb1f4b49ec299dc68aebf6bbb1b5a9450cbfdf7d2c3

    SHA512

    6b26f60b79dd44e9468b9f057c3cd256c8bd0fc4824414dc275154be2addf4d898529e14afe32b27745924b8920f1e0002f150dedaf49ebac1816316cf316757

  • C:\Users\Admin\reuowet.exe

    Filesize

    276KB

    MD5

    c04cc946bf2175fa844cdeef10a85910

    SHA1

    0ba1972658d8c5c893468e6495ad38c5ceac57cf

    SHA256

    b8c5dcd384dca4b198e57bb1f4b49ec299dc68aebf6bbb1b5a9450cbfdf7d2c3

    SHA512

    6b26f60b79dd44e9468b9f057c3cd256c8bd0fc4824414dc275154be2addf4d898529e14afe32b27745924b8920f1e0002f150dedaf49ebac1816316cf316757

  • \Users\Admin\reuowet.exe

    Filesize

    276KB

    MD5

    c04cc946bf2175fa844cdeef10a85910

    SHA1

    0ba1972658d8c5c893468e6495ad38c5ceac57cf

    SHA256

    b8c5dcd384dca4b198e57bb1f4b49ec299dc68aebf6bbb1b5a9450cbfdf7d2c3

    SHA512

    6b26f60b79dd44e9468b9f057c3cd256c8bd0fc4824414dc275154be2addf4d898529e14afe32b27745924b8920f1e0002f150dedaf49ebac1816316cf316757

  • \Users\Admin\reuowet.exe

    Filesize

    276KB

    MD5

    c04cc946bf2175fa844cdeef10a85910

    SHA1

    0ba1972658d8c5c893468e6495ad38c5ceac57cf

    SHA256

    b8c5dcd384dca4b198e57bb1f4b49ec299dc68aebf6bbb1b5a9450cbfdf7d2c3

    SHA512

    6b26f60b79dd44e9468b9f057c3cd256c8bd0fc4824414dc275154be2addf4d898529e14afe32b27745924b8920f1e0002f150dedaf49ebac1816316cf316757

  • memory/1316-59-0x0000000000000000-mapping.dmp

  • memory/1664-56-0x0000000075C81000-0x0000000075C83000-memory.dmp

    Filesize

    8KB