Analysis

  • max time kernel
    172s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 16:53

General

  • Target

    e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe

  • Size

    104KB

  • MD5

    44476fddeb066870dc7601dfde7610e0

  • SHA1

    40fc9b4cefc2d9a49edff906b718f57de57fefc5

  • SHA256

    e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a

  • SHA512

    414ca9d7b2995112283d4412b3ecf1e12d51f6130e73fb751a8f2e7051e83f4cdf87da213f5c749affa743c848106431e40b8f3ad1822eff29cb5224f31c9ea9

  • SSDEEP

    1536:vCS6Njjtm+HBc+hFKNIqpOGQvLsTZF6oc9oXjLl0Ii:qe+FrKNZ3QvLsTMo3mIi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe
    "C:\Users\Admin\AppData\Local\Temp\e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\ktqep.exe
      "C:\Users\Admin\ktqep.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ktqep.exe

    Filesize

    104KB

    MD5

    990d68a7230c30285e2527f7df37a7dc

    SHA1

    a8a2caf684f807dfffdb4438c0a792996266f04b

    SHA256

    65a219c91091495cb2a540eb87ab8e9af5d030361d08bd80f0cbc3ce8e970b92

    SHA512

    bf3dc8dff05b90ff488498f6e9d8df94acd17be0e538de228db990c119a10109b12b4d443f18dd1408d601d45046f194b8e3b7d2717b29d26285370595876d37

  • C:\Users\Admin\ktqep.exe

    Filesize

    104KB

    MD5

    990d68a7230c30285e2527f7df37a7dc

    SHA1

    a8a2caf684f807dfffdb4438c0a792996266f04b

    SHA256

    65a219c91091495cb2a540eb87ab8e9af5d030361d08bd80f0cbc3ce8e970b92

    SHA512

    bf3dc8dff05b90ff488498f6e9d8df94acd17be0e538de228db990c119a10109b12b4d443f18dd1408d601d45046f194b8e3b7d2717b29d26285370595876d37

  • \Users\Admin\ktqep.exe

    Filesize

    104KB

    MD5

    990d68a7230c30285e2527f7df37a7dc

    SHA1

    a8a2caf684f807dfffdb4438c0a792996266f04b

    SHA256

    65a219c91091495cb2a540eb87ab8e9af5d030361d08bd80f0cbc3ce8e970b92

    SHA512

    bf3dc8dff05b90ff488498f6e9d8df94acd17be0e538de228db990c119a10109b12b4d443f18dd1408d601d45046f194b8e3b7d2717b29d26285370595876d37

  • \Users\Admin\ktqep.exe

    Filesize

    104KB

    MD5

    990d68a7230c30285e2527f7df37a7dc

    SHA1

    a8a2caf684f807dfffdb4438c0a792996266f04b

    SHA256

    65a219c91091495cb2a540eb87ab8e9af5d030361d08bd80f0cbc3ce8e970b92

    SHA512

    bf3dc8dff05b90ff488498f6e9d8df94acd17be0e538de228db990c119a10109b12b4d443f18dd1408d601d45046f194b8e3b7d2717b29d26285370595876d37

  • memory/1724-56-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

    Filesize

    8KB