Analysis

  • max time kernel
    147s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 16:52

General

  • Target

    e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe

  • Size

    88KB

  • MD5

    162eae2c670b100e361b187414c47414

  • SHA1

    24636c1fdad5ad6d5a6102e9f532a53dd1b3df58

  • SHA256

    e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20

  • SHA512

    93178cbdec98b72a251cf4346500a661c2766617668d675bd82f66fe1dca03f1238ba948b1e6feecb2e69af6958875136c4733dad508ecb7c9e91c1095ba82f9

  • SSDEEP

    1536:wEUXNkL8W1pSDcw3Hr+Pa4wYe7LFrknzKLqOP:5UXTTFFonzK9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe
    "C:\Users\Admin\AppData\Local\Temp\e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:328
    • C:\Users\Admin\fuael.exe
      "C:\Users\Admin\fuael.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fuael.exe

    Filesize

    88KB

    MD5

    33eaef35a8fe6522f4045f5c82c921f0

    SHA1

    6e4c64fd6557a82b6b62b1c1cc661807d5143855

    SHA256

    81923066b3b93684d5a32ae29c3a69fd905b1c2c6466c9a47644db56d9cc4347

    SHA512

    62bd50d967b65f5ab6783a1c8efcc766dd1c7f682aad9030eed0da191ec868ddac9ad9cac311b2aebac1129c5ca3443941a5304ec966b1ce050b5af40bf83106

  • C:\Users\Admin\fuael.exe

    Filesize

    88KB

    MD5

    33eaef35a8fe6522f4045f5c82c921f0

    SHA1

    6e4c64fd6557a82b6b62b1c1cc661807d5143855

    SHA256

    81923066b3b93684d5a32ae29c3a69fd905b1c2c6466c9a47644db56d9cc4347

    SHA512

    62bd50d967b65f5ab6783a1c8efcc766dd1c7f682aad9030eed0da191ec868ddac9ad9cac311b2aebac1129c5ca3443941a5304ec966b1ce050b5af40bf83106

  • \Users\Admin\fuael.exe

    Filesize

    88KB

    MD5

    33eaef35a8fe6522f4045f5c82c921f0

    SHA1

    6e4c64fd6557a82b6b62b1c1cc661807d5143855

    SHA256

    81923066b3b93684d5a32ae29c3a69fd905b1c2c6466c9a47644db56d9cc4347

    SHA512

    62bd50d967b65f5ab6783a1c8efcc766dd1c7f682aad9030eed0da191ec868ddac9ad9cac311b2aebac1129c5ca3443941a5304ec966b1ce050b5af40bf83106

  • \Users\Admin\fuael.exe

    Filesize

    88KB

    MD5

    33eaef35a8fe6522f4045f5c82c921f0

    SHA1

    6e4c64fd6557a82b6b62b1c1cc661807d5143855

    SHA256

    81923066b3b93684d5a32ae29c3a69fd905b1c2c6466c9a47644db56d9cc4347

    SHA512

    62bd50d967b65f5ab6783a1c8efcc766dd1c7f682aad9030eed0da191ec868ddac9ad9cac311b2aebac1129c5ca3443941a5304ec966b1ce050b5af40bf83106

  • memory/328-56-0x0000000075ED1000-0x0000000075ED3000-memory.dmp

    Filesize

    8KB