Analysis

  • max time kernel
    151s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 02:06

General

  • Target

    26c32f20a7343375402584263d469b2ad2d5d3a3920d09d63e85629d5579adf9.exe

  • Size

    224KB

  • MD5

    d6a2326d38e4339479ecf19dedf0b84b

  • SHA1

    93ab9d67c04c34eefaceaed1e7770ccf3015e324

  • SHA256

    26c32f20a7343375402584263d469b2ad2d5d3a3920d09d63e85629d5579adf9

  • SHA512

    af4777dd80f70a795705bc56e9158647423b757831b49ea01b5b6dd22cb72ef6c4963f308ba29884ba1f3ad9e9d111f09e8305c08df51d9434cc895dca3324cb

  • SSDEEP

    3072:Hk6kvZjWnE5bqaAF/OVLj4UbaxxmLQTi2//9U33T+NVzo:H1kBm7aAF4RFSs

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26c32f20a7343375402584263d469b2ad2d5d3a3920d09d63e85629d5579adf9.exe
    "C:\Users\Admin\AppData\Local\Temp\26c32f20a7343375402584263d469b2ad2d5d3a3920d09d63e85629d5579adf9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\maaaduf.exe
      "C:\Users\Admin\maaaduf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:964

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\maaaduf.exe

          Filesize

          224KB

          MD5

          4061cf737f39a0bb91bad0e8de3dd0e6

          SHA1

          9f80157408c81fa266eed5ffa741e8c2b8c48713

          SHA256

          d25235a3cdc6a82e9b5f6cdcd0c904e276dd31da1b3dbbca23315233a89af75c

          SHA512

          dfaf689fa494306b0898fe0d036fb2ea4dbe003a5a53f0b308c2d4117a2681f082e70b9f762003aaa817a0df34a47d4fa3c94716de74075574af287a3f82d706

        • C:\Users\Admin\maaaduf.exe

          Filesize

          224KB

          MD5

          4061cf737f39a0bb91bad0e8de3dd0e6

          SHA1

          9f80157408c81fa266eed5ffa741e8c2b8c48713

          SHA256

          d25235a3cdc6a82e9b5f6cdcd0c904e276dd31da1b3dbbca23315233a89af75c

          SHA512

          dfaf689fa494306b0898fe0d036fb2ea4dbe003a5a53f0b308c2d4117a2681f082e70b9f762003aaa817a0df34a47d4fa3c94716de74075574af287a3f82d706

        • \Users\Admin\maaaduf.exe

          Filesize

          224KB

          MD5

          4061cf737f39a0bb91bad0e8de3dd0e6

          SHA1

          9f80157408c81fa266eed5ffa741e8c2b8c48713

          SHA256

          d25235a3cdc6a82e9b5f6cdcd0c904e276dd31da1b3dbbca23315233a89af75c

          SHA512

          dfaf689fa494306b0898fe0d036fb2ea4dbe003a5a53f0b308c2d4117a2681f082e70b9f762003aaa817a0df34a47d4fa3c94716de74075574af287a3f82d706

        • \Users\Admin\maaaduf.exe

          Filesize

          224KB

          MD5

          4061cf737f39a0bb91bad0e8de3dd0e6

          SHA1

          9f80157408c81fa266eed5ffa741e8c2b8c48713

          SHA256

          d25235a3cdc6a82e9b5f6cdcd0c904e276dd31da1b3dbbca23315233a89af75c

          SHA512

          dfaf689fa494306b0898fe0d036fb2ea4dbe003a5a53f0b308c2d4117a2681f082e70b9f762003aaa817a0df34a47d4fa3c94716de74075574af287a3f82d706

        • memory/2036-56-0x0000000075511000-0x0000000075513000-memory.dmp

          Filesize

          8KB