Analysis

  • max time kernel
    153s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 19:31

General

  • Target

    287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe

  • Size

    84KB

  • MD5

    187ebed20ef31dbf7e7fe6fce1feb28e

  • SHA1

    10f6959294838dd05cfca8760b65c1761cc9bd09

  • SHA256

    287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426

  • SHA512

    53b334b0918849e3eeffa1b748109298b4cd0154c97715275adb679decee33568d3e7b2390ca1353382e6f7eef2fb9a9028ad6418c22e43e214126bb7c55227f

  • SSDEEP

    768:DyV+hOvo/OswzKvgO0jAIWi3KEyUhL7b7Yqlf4JwQltjmtTBHi7Alg:DoFvOyES76Ezh/vYlJwAitTB3lg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe
    "C:\Users\Admin\AppData\Local\Temp\287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:364
    • C:\Users\Admin\heuinoq.exe
      "C:\Users\Admin\heuinoq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2044
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 816
      2⤵
      • Program crash
      PID:1904

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\heuinoq.exe

          Filesize

          84KB

          MD5

          ebad2d94ac69211cfd8ccdbc416a7963

          SHA1

          8149c385ef5cce4f8edea8188999812830584308

          SHA256

          409f7a9dfcf3dcd5d9e9700cf64ff139772159d03f9521d62a814fb77fd62e65

          SHA512

          d0bd31c710189a95466c5ec9e7e0d0837e1c58dfd6229b78b1c797ae6496aad4eddd15b834e878c9283c4d86ec5cb5b59a74d782010f8cf7f037ca8f327bcb4d

        • C:\Users\Admin\heuinoq.exe

          Filesize

          84KB

          MD5

          ebad2d94ac69211cfd8ccdbc416a7963

          SHA1

          8149c385ef5cce4f8edea8188999812830584308

          SHA256

          409f7a9dfcf3dcd5d9e9700cf64ff139772159d03f9521d62a814fb77fd62e65

          SHA512

          d0bd31c710189a95466c5ec9e7e0d0837e1c58dfd6229b78b1c797ae6496aad4eddd15b834e878c9283c4d86ec5cb5b59a74d782010f8cf7f037ca8f327bcb4d

        • \Users\Admin\heuinoq.exe

          Filesize

          84KB

          MD5

          ebad2d94ac69211cfd8ccdbc416a7963

          SHA1

          8149c385ef5cce4f8edea8188999812830584308

          SHA256

          409f7a9dfcf3dcd5d9e9700cf64ff139772159d03f9521d62a814fb77fd62e65

          SHA512

          d0bd31c710189a95466c5ec9e7e0d0837e1c58dfd6229b78b1c797ae6496aad4eddd15b834e878c9283c4d86ec5cb5b59a74d782010f8cf7f037ca8f327bcb4d

        • \Users\Admin\heuinoq.exe

          Filesize

          84KB

          MD5

          ebad2d94ac69211cfd8ccdbc416a7963

          SHA1

          8149c385ef5cce4f8edea8188999812830584308

          SHA256

          409f7a9dfcf3dcd5d9e9700cf64ff139772159d03f9521d62a814fb77fd62e65

          SHA512

          d0bd31c710189a95466c5ec9e7e0d0837e1c58dfd6229b78b1c797ae6496aad4eddd15b834e878c9283c4d86ec5cb5b59a74d782010f8cf7f037ca8f327bcb4d

        • memory/364-56-0x0000000075131000-0x0000000075133000-memory.dmp

          Filesize

          8KB