Analysis

  • max time kernel
    205s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 18:50

General

  • Target

    1eeda357be2858674f3791cb21f3044c10cb19ca14ec0a0cb94391f8ebe4c48d.exe

  • Size

    256KB

  • MD5

    949440045951524cd2176ff5cc1b6bd0

  • SHA1

    04b6a3b8554af28710c79aa3c9286cf788368276

  • SHA256

    1eeda357be2858674f3791cb21f3044c10cb19ca14ec0a0cb94391f8ebe4c48d

  • SHA512

    c02cfcc212438f4c3822b926193e6131a7744360af3f4257b65e4e1581da689682a62fb6d1e7930cfaed3f00d2cccc62f71eea59a47f2b69437f68b250f7de68

  • SSDEEP

    6144:yfMmPlptNvl9fm0UBFsqMabeYiUDogmFv:yx9n9lJvaFsqMvNv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 48 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1eeda357be2858674f3791cb21f3044c10cb19ca14ec0a0cb94391f8ebe4c48d.exe
    "C:\Users\Admin\AppData\Local\Temp\1eeda357be2858674f3791cb21f3044c10cb19ca14ec0a0cb94391f8ebe4c48d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\bouuri.exe
      "C:\Users\Admin\bouuri.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1316

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\bouuri.exe

          Filesize

          256KB

          MD5

          30b35400a4acec77d1e155ddcc9639ba

          SHA1

          ac94eef0d2c0c19034f814b185e1e927771db5ff

          SHA256

          5ab8ced3aa81db3b7b18ae84a86d9e642facb818f815b34d6a3b3d6f18715851

          SHA512

          914a4f60e739d25aa66bfb25195d32370abfdfa03eaa3c6fc3d5b10f5d5c5fc1f79901f2445c8c83b4eea082be46484185f6104e92d3b3117a2c9cbf24c6133d

        • C:\Users\Admin\bouuri.exe

          Filesize

          256KB

          MD5

          30b35400a4acec77d1e155ddcc9639ba

          SHA1

          ac94eef0d2c0c19034f814b185e1e927771db5ff

          SHA256

          5ab8ced3aa81db3b7b18ae84a86d9e642facb818f815b34d6a3b3d6f18715851

          SHA512

          914a4f60e739d25aa66bfb25195d32370abfdfa03eaa3c6fc3d5b10f5d5c5fc1f79901f2445c8c83b4eea082be46484185f6104e92d3b3117a2c9cbf24c6133d

        • \Users\Admin\bouuri.exe

          Filesize

          256KB

          MD5

          30b35400a4acec77d1e155ddcc9639ba

          SHA1

          ac94eef0d2c0c19034f814b185e1e927771db5ff

          SHA256

          5ab8ced3aa81db3b7b18ae84a86d9e642facb818f815b34d6a3b3d6f18715851

          SHA512

          914a4f60e739d25aa66bfb25195d32370abfdfa03eaa3c6fc3d5b10f5d5c5fc1f79901f2445c8c83b4eea082be46484185f6104e92d3b3117a2c9cbf24c6133d

        • \Users\Admin\bouuri.exe

          Filesize

          256KB

          MD5

          30b35400a4acec77d1e155ddcc9639ba

          SHA1

          ac94eef0d2c0c19034f814b185e1e927771db5ff

          SHA256

          5ab8ced3aa81db3b7b18ae84a86d9e642facb818f815b34d6a3b3d6f18715851

          SHA512

          914a4f60e739d25aa66bfb25195d32370abfdfa03eaa3c6fc3d5b10f5d5c5fc1f79901f2445c8c83b4eea082be46484185f6104e92d3b3117a2c9cbf24c6133d

        • memory/1676-56-0x0000000075C81000-0x0000000075C83000-memory.dmp

          Filesize

          8KB