Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 03:04

General

  • Target

    5ec537f3d1667debc73a1409b0aab7dd608a07be3d8a844ed9484c3cdc0b7e59.exe

  • Size

    228KB

  • MD5

    6ada43ebb2e5d020af25b5d9b7f5f34f

  • SHA1

    45570664fa5ec5693266926cea564fc617974a89

  • SHA256

    5ec537f3d1667debc73a1409b0aab7dd608a07be3d8a844ed9484c3cdc0b7e59

  • SHA512

    be5ec759753c75f569b2c7f81f3898e5382d27a0bb7c644cb8e297284cdf1b2905613469453a2f56618ae48391efcf0a5f76624d67474dd703dcd4bec423a1b3

  • SSDEEP

    6144:kmi3PFKs7aFwKWwalhrEqxF6snji81RUinKZHg/jF:kmAPhAmZIH+x

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ec537f3d1667debc73a1409b0aab7dd608a07be3d8a844ed9484c3cdc0b7e59.exe
    "C:\Users\Admin\AppData\Local\Temp\5ec537f3d1667debc73a1409b0aab7dd608a07be3d8a844ed9484c3cdc0b7e59.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\qaoozu.exe
      "C:\Users\Admin\qaoozu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qaoozu.exe

    Filesize

    228KB

    MD5

    aacccc977c4f5f036fe113569d7b227b

    SHA1

    94fcb6a3f7e2d67389e8baf710b587748644a6d0

    SHA256

    c42c78e1affaf835a5189038798177eaa75affbaffb5151755a8bb7f5e744bed

    SHA512

    88ec51fbfdf9de3a65a1fee11042c40c02719dd14151b5c5831a798a61b174d850ccd3d454d4d6c9b775ea101a81103e5fab53d914d2023ea77c9b22e5fb3839

  • C:\Users\Admin\qaoozu.exe

    Filesize

    228KB

    MD5

    aacccc977c4f5f036fe113569d7b227b

    SHA1

    94fcb6a3f7e2d67389e8baf710b587748644a6d0

    SHA256

    c42c78e1affaf835a5189038798177eaa75affbaffb5151755a8bb7f5e744bed

    SHA512

    88ec51fbfdf9de3a65a1fee11042c40c02719dd14151b5c5831a798a61b174d850ccd3d454d4d6c9b775ea101a81103e5fab53d914d2023ea77c9b22e5fb3839

  • \Users\Admin\qaoozu.exe

    Filesize

    228KB

    MD5

    aacccc977c4f5f036fe113569d7b227b

    SHA1

    94fcb6a3f7e2d67389e8baf710b587748644a6d0

    SHA256

    c42c78e1affaf835a5189038798177eaa75affbaffb5151755a8bb7f5e744bed

    SHA512

    88ec51fbfdf9de3a65a1fee11042c40c02719dd14151b5c5831a798a61b174d850ccd3d454d4d6c9b775ea101a81103e5fab53d914d2023ea77c9b22e5fb3839

  • \Users\Admin\qaoozu.exe

    Filesize

    228KB

    MD5

    aacccc977c4f5f036fe113569d7b227b

    SHA1

    94fcb6a3f7e2d67389e8baf710b587748644a6d0

    SHA256

    c42c78e1affaf835a5189038798177eaa75affbaffb5151755a8bb7f5e744bed

    SHA512

    88ec51fbfdf9de3a65a1fee11042c40c02719dd14151b5c5831a798a61b174d850ccd3d454d4d6c9b775ea101a81103e5fab53d914d2023ea77c9b22e5fb3839

  • memory/976-59-0x0000000000000000-mapping.dmp

  • memory/1368-56-0x0000000074E41000-0x0000000074E43000-memory.dmp

    Filesize

    8KB