Analysis

  • max time kernel
    152s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 13:32

General

  • Target

    4935b278900a8357957186261d369b421118c31bf146ffb42ab165661ebf0cfb.exe

  • Size

    100KB

  • MD5

    6058ff144674ba09d1b6d07c79e1265c

  • SHA1

    f82c8ed10dc1f2a41225676c24cd1519bd3175fd

  • SHA256

    4935b278900a8357957186261d369b421118c31bf146ffb42ab165661ebf0cfb

  • SHA512

    1c05b952577048bbbcfbb2c4058dcfdbf43e1d8d7dddbf57218113d38ef8425f1b9fb8cb17216b926c268fb4adc39f258d01da12fd955a5c5f89656376eb307e

  • SSDEEP

    1536:n4Hi0gNHdOp4BNRXAEwqScgDz0Bg2PDXJRde/SwvFMYVwC+QaMnoXjLl06d:CKdW4zDfDXJVI+oo3m6d

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4935b278900a8357957186261d369b421118c31bf146ffb42ab165661ebf0cfb.exe
    "C:\Users\Admin\AppData\Local\Temp\4935b278900a8357957186261d369b421118c31bf146ffb42ab165661ebf0cfb.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Users\Admin\heihooy.exe
      "C:\Users\Admin\heihooy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:584

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\heihooy.exe

          Filesize

          100KB

          MD5

          e347058fdfad10f9bb2cead5b5af91d4

          SHA1

          2791a4fc3e5c59d55cd033ea78c657d670fc342f

          SHA256

          ac29f19b650948d6f0afc1fabc6f02420fbb673dfdeb96b2df870b2141a6b8fb

          SHA512

          a3b634963a2f49a0b7eaa82fbdd398ceecc76697a8f517aa681b27827360acb4e1276a99fd98084b32d288af76bd75438ec577bf85135c011de12e576b7863c8

        • C:\Users\Admin\heihooy.exe

          Filesize

          100KB

          MD5

          e347058fdfad10f9bb2cead5b5af91d4

          SHA1

          2791a4fc3e5c59d55cd033ea78c657d670fc342f

          SHA256

          ac29f19b650948d6f0afc1fabc6f02420fbb673dfdeb96b2df870b2141a6b8fb

          SHA512

          a3b634963a2f49a0b7eaa82fbdd398ceecc76697a8f517aa681b27827360acb4e1276a99fd98084b32d288af76bd75438ec577bf85135c011de12e576b7863c8

        • \Users\Admin\heihooy.exe

          Filesize

          100KB

          MD5

          e347058fdfad10f9bb2cead5b5af91d4

          SHA1

          2791a4fc3e5c59d55cd033ea78c657d670fc342f

          SHA256

          ac29f19b650948d6f0afc1fabc6f02420fbb673dfdeb96b2df870b2141a6b8fb

          SHA512

          a3b634963a2f49a0b7eaa82fbdd398ceecc76697a8f517aa681b27827360acb4e1276a99fd98084b32d288af76bd75438ec577bf85135c011de12e576b7863c8

        • \Users\Admin\heihooy.exe

          Filesize

          100KB

          MD5

          e347058fdfad10f9bb2cead5b5af91d4

          SHA1

          2791a4fc3e5c59d55cd033ea78c657d670fc342f

          SHA256

          ac29f19b650948d6f0afc1fabc6f02420fbb673dfdeb96b2df870b2141a6b8fb

          SHA512

          a3b634963a2f49a0b7eaa82fbdd398ceecc76697a8f517aa681b27827360acb4e1276a99fd98084b32d288af76bd75438ec577bf85135c011de12e576b7863c8

        • memory/1152-56-0x0000000075881000-0x0000000075883000-memory.dmp

          Filesize

          8KB