Analysis

  • max time kernel
    153s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 03:13

General

  • Target

    4b6bef695222ab3e7153665cc5443fa4d98d09d5309b852d93f7bcd05c90424f.exe

  • Size

    180KB

  • MD5

    41dc10d709e9f7fbb949c3c746a79300

  • SHA1

    4cd53b881e5ecf65b5c0edfe7bb5d4a222236ec9

  • SHA256

    4b6bef695222ab3e7153665cc5443fa4d98d09d5309b852d93f7bcd05c90424f

  • SHA512

    958a9cbc2089c0055d0c5f99edcd12b80049ae774b0d67d45083aa974f6e5d69c8c7f484a7b7b1a06ecc2f0483c51c4d92020c9b8b579146b884bd62d5176648

  • SSDEEP

    3072:qFKdBG5H1MlttMFz8o+F334VSlkfoyHYb/zCHPEhg5JN8x+eDfcAuQPUSnrulRr:qFeG5H1MltKaJkHHYb/zCHPEhg5JN8xm

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b6bef695222ab3e7153665cc5443fa4d98d09d5309b852d93f7bcd05c90424f.exe
    "C:\Users\Admin\AppData\Local\Temp\4b6bef695222ab3e7153665cc5443fa4d98d09d5309b852d93f7bcd05c90424f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\tuuhot.exe
      "C:\Users\Admin\tuuhot.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tuuhot.exe

    Filesize

    180KB

    MD5

    43d07e11349d9a28f5e782a6dc080358

    SHA1

    93b44c24b0e65ebb336da67a56f5ea5ed28d1339

    SHA256

    03936475a2ab3f7bc326777e94e25dbf6a50ee39db7c57e9eba6f3560cd4c829

    SHA512

    2b3f94a41b8dd67bd5ee072082142b69562078de2f7b1f23aa827beb07ec7f7189ab6706381486388c01f38d89687cb65d3564b304bb520bce00940af4fd8f4a

  • C:\Users\Admin\tuuhot.exe

    Filesize

    180KB

    MD5

    43d07e11349d9a28f5e782a6dc080358

    SHA1

    93b44c24b0e65ebb336da67a56f5ea5ed28d1339

    SHA256

    03936475a2ab3f7bc326777e94e25dbf6a50ee39db7c57e9eba6f3560cd4c829

    SHA512

    2b3f94a41b8dd67bd5ee072082142b69562078de2f7b1f23aa827beb07ec7f7189ab6706381486388c01f38d89687cb65d3564b304bb520bce00940af4fd8f4a

  • \Users\Admin\tuuhot.exe

    Filesize

    180KB

    MD5

    43d07e11349d9a28f5e782a6dc080358

    SHA1

    93b44c24b0e65ebb336da67a56f5ea5ed28d1339

    SHA256

    03936475a2ab3f7bc326777e94e25dbf6a50ee39db7c57e9eba6f3560cd4c829

    SHA512

    2b3f94a41b8dd67bd5ee072082142b69562078de2f7b1f23aa827beb07ec7f7189ab6706381486388c01f38d89687cb65d3564b304bb520bce00940af4fd8f4a

  • \Users\Admin\tuuhot.exe

    Filesize

    180KB

    MD5

    43d07e11349d9a28f5e782a6dc080358

    SHA1

    93b44c24b0e65ebb336da67a56f5ea5ed28d1339

    SHA256

    03936475a2ab3f7bc326777e94e25dbf6a50ee39db7c57e9eba6f3560cd4c829

    SHA512

    2b3f94a41b8dd67bd5ee072082142b69562078de2f7b1f23aa827beb07ec7f7189ab6706381486388c01f38d89687cb65d3564b304bb520bce00940af4fd8f4a

  • memory/112-59-0x0000000000000000-mapping.dmp

  • memory/1636-56-0x0000000075E51000-0x0000000075E53000-memory.dmp

    Filesize

    8KB