Analysis

  • max time kernel
    151s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:29

General

  • Target

    1613b5863d2a9b7e258ea34dd7e82f915b6b054c74a517cd58b3ce7393a3b2c2.exe

  • Size

    300KB

  • MD5

    40f09a3954d81c9cca3e158fe69509aa

  • SHA1

    050795dc3cae450f53dd5ed70fc31dc2b5c3e121

  • SHA256

    1613b5863d2a9b7e258ea34dd7e82f915b6b054c74a517cd58b3ce7393a3b2c2

  • SHA512

    b15f526af835bbd0cd636895161d4683acb2f080f8c51387a70cb2ba9e8f6c99ed592aa25e64bb67b3278c85bcdf22110a2d78fd795eeb111a1564043b3f90d7

  • SSDEEP

    6144:ejod6a6avuz2kX681UbgwDO7zRdmM57M186cFGK:ejOlvuzDEK

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1613b5863d2a9b7e258ea34dd7e82f915b6b054c74a517cd58b3ce7393a3b2c2.exe
    "C:\Users\Admin\AppData\Local\Temp\1613b5863d2a9b7e258ea34dd7e82f915b6b054c74a517cd58b3ce7393a3b2c2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\youupa.exe
      "C:\Users\Admin\youupa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\youupa.exe

    Filesize

    300KB

    MD5

    405406eff112d9cf9fb5bb6f76202472

    SHA1

    a2d9fae415192b32c0a4accf59987776f5ae6098

    SHA256

    194e8370cef58115854e82c9127b8d639be8492e777900d5565c918c1de021c5

    SHA512

    8c9d853027822cc80855e48564b5c2a2bd931f946851053abecca4fd561c8502d035769255fa44f35e6520f1e729bf756e7559d319c66cb363e985de6144b113

  • C:\Users\Admin\youupa.exe

    Filesize

    300KB

    MD5

    405406eff112d9cf9fb5bb6f76202472

    SHA1

    a2d9fae415192b32c0a4accf59987776f5ae6098

    SHA256

    194e8370cef58115854e82c9127b8d639be8492e777900d5565c918c1de021c5

    SHA512

    8c9d853027822cc80855e48564b5c2a2bd931f946851053abecca4fd561c8502d035769255fa44f35e6520f1e729bf756e7559d319c66cb363e985de6144b113

  • \Users\Admin\youupa.exe

    Filesize

    300KB

    MD5

    405406eff112d9cf9fb5bb6f76202472

    SHA1

    a2d9fae415192b32c0a4accf59987776f5ae6098

    SHA256

    194e8370cef58115854e82c9127b8d639be8492e777900d5565c918c1de021c5

    SHA512

    8c9d853027822cc80855e48564b5c2a2bd931f946851053abecca4fd561c8502d035769255fa44f35e6520f1e729bf756e7559d319c66cb363e985de6144b113

  • \Users\Admin\youupa.exe

    Filesize

    300KB

    MD5

    405406eff112d9cf9fb5bb6f76202472

    SHA1

    a2d9fae415192b32c0a4accf59987776f5ae6098

    SHA256

    194e8370cef58115854e82c9127b8d639be8492e777900d5565c918c1de021c5

    SHA512

    8c9d853027822cc80855e48564b5c2a2bd931f946851053abecca4fd561c8502d035769255fa44f35e6520f1e729bf756e7559d319c66cb363e985de6144b113

  • memory/1028-56-0x0000000075021000-0x0000000075023000-memory.dmp

    Filesize

    8KB

  • memory/1092-59-0x0000000000000000-mapping.dmp