Analysis

  • max time kernel
    151s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 03:27

General

  • Target

    67cce9a25d65adb0d9b3cb88cde24590790ca7a2f8c83f0730a244f5b150e122.exe

  • Size

    128KB

  • MD5

    2de484facb120f5554b05c58ad00f563

  • SHA1

    1775e2f4f63dd225be4fc872d4adffbe14259c0d

  • SHA256

    67cce9a25d65adb0d9b3cb88cde24590790ca7a2f8c83f0730a244f5b150e122

  • SHA512

    6427c38ea73ce30a5e05fa7a9ca6e16e84b07e8afbf93b271d96918c697823adb9f820f65463bb95e7a64cadefcfe0a18aec781ecd020ca6fd306ab20d6a1380

  • SSDEEP

    1536:aLkkbuIXVHKTU097h9Z1SFlc4IE3IezPoVtTqtFyUoHnkHUS65Bciu+HnXtk:SkkbugKTU0bz1mWAojqbdB+HS

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 58 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67cce9a25d65adb0d9b3cb88cde24590790ca7a2f8c83f0730a244f5b150e122.exe
    "C:\Users\Admin\AppData\Local\Temp\67cce9a25d65adb0d9b3cb88cde24590790ca7a2f8c83f0730a244f5b150e122.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\nerah.exe
      "C:\Users\Admin\nerah.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\nerah.exe

    Filesize

    128KB

    MD5

    aecdaa4dd6d7528ca118f9105eed2293

    SHA1

    daa23925e1c8e005e28a3cf601fd2518d54f30f1

    SHA256

    e8b13ce9494d20b653fa535e37026bea3a3582818b8ca3ba13c5634ba6a0811b

    SHA512

    c2d6172784b8b02a2f40133bc40796cd8d8a490d0ca9c1a246d4e380975a8c2beb9f0b49b1a1b6c90f408182f3d8fcddd567852715d05ea43686bd3a7ba526fa

  • C:\Users\Admin\nerah.exe

    Filesize

    128KB

    MD5

    aecdaa4dd6d7528ca118f9105eed2293

    SHA1

    daa23925e1c8e005e28a3cf601fd2518d54f30f1

    SHA256

    e8b13ce9494d20b653fa535e37026bea3a3582818b8ca3ba13c5634ba6a0811b

    SHA512

    c2d6172784b8b02a2f40133bc40796cd8d8a490d0ca9c1a246d4e380975a8c2beb9f0b49b1a1b6c90f408182f3d8fcddd567852715d05ea43686bd3a7ba526fa

  • \Users\Admin\nerah.exe

    Filesize

    128KB

    MD5

    aecdaa4dd6d7528ca118f9105eed2293

    SHA1

    daa23925e1c8e005e28a3cf601fd2518d54f30f1

    SHA256

    e8b13ce9494d20b653fa535e37026bea3a3582818b8ca3ba13c5634ba6a0811b

    SHA512

    c2d6172784b8b02a2f40133bc40796cd8d8a490d0ca9c1a246d4e380975a8c2beb9f0b49b1a1b6c90f408182f3d8fcddd567852715d05ea43686bd3a7ba526fa

  • \Users\Admin\nerah.exe

    Filesize

    128KB

    MD5

    aecdaa4dd6d7528ca118f9105eed2293

    SHA1

    daa23925e1c8e005e28a3cf601fd2518d54f30f1

    SHA256

    e8b13ce9494d20b653fa535e37026bea3a3582818b8ca3ba13c5634ba6a0811b

    SHA512

    c2d6172784b8b02a2f40133bc40796cd8d8a490d0ca9c1a246d4e380975a8c2beb9f0b49b1a1b6c90f408182f3d8fcddd567852715d05ea43686bd3a7ba526fa

  • memory/1200-56-0x0000000076041000-0x0000000076043000-memory.dmp

    Filesize

    8KB