Analysis

  • max time kernel
    150s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 03:27

General

  • Target

    b051de486bb684f10acbbfc3c08c58be0b511255ec87c39130bbb3091ed6c327.exe

  • Size

    124KB

  • MD5

    2e4e045cef68e0b2b0b62120e1aff47a

  • SHA1

    27492e944270c68c811496bb162180568038abe8

  • SHA256

    b051de486bb684f10acbbfc3c08c58be0b511255ec87c39130bbb3091ed6c327

  • SHA512

    f19b4c0f6a45afc372f81a9b586c66e2c2e6ca285138b27ea80665fbc86103718a6ca2ea93334506892a2b2b8fa484c6212e292121111c136f336e2f5d4b7379

  • SSDEEP

    1536:TKszb5YuFOhRO/N69BH3OoGa+FLHjKKvRgrkOSo8NeG0h/l:+GNYushkFoN3Oo1+FvkSIt

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b051de486bb684f10acbbfc3c08c58be0b511255ec87c39130bbb3091ed6c327.exe
    "C:\Users\Admin\AppData\Local\Temp\b051de486bb684f10acbbfc3c08c58be0b511255ec87c39130bbb3091ed6c327.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\puuora.exe
      "C:\Users\Admin\puuora.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:952

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\puuora.exe

          Filesize

          124KB

          MD5

          56bb3935094aa64ceb157882aff034e4

          SHA1

          d6a857816e4d848181d311db93c1023cf3cd800c

          SHA256

          4a8e3921b984d9a7fcc3c0026ac055ed4d5e10fe8e69b617fc39a3962184f013

          SHA512

          3fd9af0aa7ada2b56e4098e2eb65778f9ddfec1ac379dd28d2857b2c148d75f2ad05b49213d987fd87eef8936da6e15770d01d0193c019e1eeff95b1fb5b99db

        • C:\Users\Admin\puuora.exe

          Filesize

          124KB

          MD5

          56bb3935094aa64ceb157882aff034e4

          SHA1

          d6a857816e4d848181d311db93c1023cf3cd800c

          SHA256

          4a8e3921b984d9a7fcc3c0026ac055ed4d5e10fe8e69b617fc39a3962184f013

          SHA512

          3fd9af0aa7ada2b56e4098e2eb65778f9ddfec1ac379dd28d2857b2c148d75f2ad05b49213d987fd87eef8936da6e15770d01d0193c019e1eeff95b1fb5b99db

        • \Users\Admin\puuora.exe

          Filesize

          124KB

          MD5

          56bb3935094aa64ceb157882aff034e4

          SHA1

          d6a857816e4d848181d311db93c1023cf3cd800c

          SHA256

          4a8e3921b984d9a7fcc3c0026ac055ed4d5e10fe8e69b617fc39a3962184f013

          SHA512

          3fd9af0aa7ada2b56e4098e2eb65778f9ddfec1ac379dd28d2857b2c148d75f2ad05b49213d987fd87eef8936da6e15770d01d0193c019e1eeff95b1fb5b99db

        • \Users\Admin\puuora.exe

          Filesize

          124KB

          MD5

          56bb3935094aa64ceb157882aff034e4

          SHA1

          d6a857816e4d848181d311db93c1023cf3cd800c

          SHA256

          4a8e3921b984d9a7fcc3c0026ac055ed4d5e10fe8e69b617fc39a3962184f013

          SHA512

          3fd9af0aa7ada2b56e4098e2eb65778f9ddfec1ac379dd28d2857b2c148d75f2ad05b49213d987fd87eef8936da6e15770d01d0193c019e1eeff95b1fb5b99db

        • memory/1624-56-0x0000000076041000-0x0000000076043000-memory.dmp

          Filesize

          8KB