Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 14:44

General

  • Target

    d51448fd8156659f074cc1911ec9acf83d5cca343f3da25e7fba35e3a76b0ab6.exe

  • Size

    240KB

  • MD5

    3c4265a12704bebaeaeac7f1cbf58548

  • SHA1

    cbe4a3393adc5a4ccb77bc23acb2b73415c6590a

  • SHA256

    d51448fd8156659f074cc1911ec9acf83d5cca343f3da25e7fba35e3a76b0ab6

  • SHA512

    27c6718252b81e82c8c232add6b567f2ecbd821fb537a09a6126dbce045145237728546a35bd18bc40641c94426704ad086d7765cfc57ef4659980424e1f8ff2

  • SSDEEP

    6144:Mo85UtO7RQjX7XN1kd9JbSDviiopNDa/N08i0/:74xNM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d51448fd8156659f074cc1911ec9acf83d5cca343f3da25e7fba35e3a76b0ab6.exe
    "C:\Users\Admin\AppData\Local\Temp\d51448fd8156659f074cc1911ec9acf83d5cca343f3da25e7fba35e3a76b0ab6.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Users\Admin\ziawua.exe
      "C:\Users\Admin\ziawua.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2008

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\ziawua.exe

          Filesize

          240KB

          MD5

          1fba8223a8cb7a64bc1500fecaf1de04

          SHA1

          c4255a40cab545bbbc8d74291afe7bfc20087129

          SHA256

          940fba0d3c9bd9178015b441b2e63efc98a2ee73fe61d93de0b583c73813defa

          SHA512

          e90dabaf3e805f4be6639473a6ad1849d89a5bffbb989997ef4a0775648b5dcd6b93936b449ecdfc735caf5ae142b338d991660a522c64715ac5d389b632d5e6

        • C:\Users\Admin\ziawua.exe

          Filesize

          240KB

          MD5

          1fba8223a8cb7a64bc1500fecaf1de04

          SHA1

          c4255a40cab545bbbc8d74291afe7bfc20087129

          SHA256

          940fba0d3c9bd9178015b441b2e63efc98a2ee73fe61d93de0b583c73813defa

          SHA512

          e90dabaf3e805f4be6639473a6ad1849d89a5bffbb989997ef4a0775648b5dcd6b93936b449ecdfc735caf5ae142b338d991660a522c64715ac5d389b632d5e6

        • \Users\Admin\ziawua.exe

          Filesize

          240KB

          MD5

          1fba8223a8cb7a64bc1500fecaf1de04

          SHA1

          c4255a40cab545bbbc8d74291afe7bfc20087129

          SHA256

          940fba0d3c9bd9178015b441b2e63efc98a2ee73fe61d93de0b583c73813defa

          SHA512

          e90dabaf3e805f4be6639473a6ad1849d89a5bffbb989997ef4a0775648b5dcd6b93936b449ecdfc735caf5ae142b338d991660a522c64715ac5d389b632d5e6

        • \Users\Admin\ziawua.exe

          Filesize

          240KB

          MD5

          1fba8223a8cb7a64bc1500fecaf1de04

          SHA1

          c4255a40cab545bbbc8d74291afe7bfc20087129

          SHA256

          940fba0d3c9bd9178015b441b2e63efc98a2ee73fe61d93de0b583c73813defa

          SHA512

          e90dabaf3e805f4be6639473a6ad1849d89a5bffbb989997ef4a0775648b5dcd6b93936b449ecdfc735caf5ae142b338d991660a522c64715ac5d389b632d5e6

        • memory/1572-56-0x0000000076121000-0x0000000076123000-memory.dmp

          Filesize

          8KB