Analysis

  • max time kernel
    258s
  • max time network
    332s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 16:55

General

  • Target

    e0e1fb23c46ca7c5b81faded225f6ff176d69e938b10a992e360e1cf7a598ad8.exe

  • Size

    100KB

  • MD5

    1ee4ce13b367789586893126bccb17e0

  • SHA1

    dc2cc4877537e765ee32211fdd17dcb8fcf8541a

  • SHA256

    e0e1fb23c46ca7c5b81faded225f6ff176d69e938b10a992e360e1cf7a598ad8

  • SHA512

    48f220e17c2797bc94382a9cae729769be98b93a62135ae19de74b46510d80913d9b17c6aca8b82f04f91d7e0a3baf02ca8777729f5d29168cef5e0d826f8834

  • SSDEEP

    1536:PC/8iAuismyWsjKCWRw0wF9MGM9K/lKtNgCMbATbL3N+NM5EfsNIjnZUc:qjKHtTLOM57CnCc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0e1fb23c46ca7c5b81faded225f6ff176d69e938b10a992e360e1cf7a598ad8.exe
    "C:\Users\Admin\AppData\Local\Temp\e0e1fb23c46ca7c5b81faded225f6ff176d69e938b10a992e360e1cf7a598ad8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Users\Admin\xaiiw.exe
      "C:\Users\Admin\xaiiw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xaiiw.exe

    Filesize

    100KB

    MD5

    bafe43a7397b4ee361414902538853e5

    SHA1

    ed20391abf1ae115cd09fb4acb3ef923d1ff593e

    SHA256

    3884ba731ab4c9f1220eb56aaadd1e946eed8493f6e2d395cebecd4eb056d73b

    SHA512

    5a332a36e2e2e9b547f03bd4c1b73f6d28908ac2f2f78461785084a9e9ffd6a2bbe04ac8fd49cc872cf8d0df38fa0604bf9187ecef50bb1edf0bc4ebb26c70aa

  • C:\Users\Admin\xaiiw.exe

    Filesize

    100KB

    MD5

    bafe43a7397b4ee361414902538853e5

    SHA1

    ed20391abf1ae115cd09fb4acb3ef923d1ff593e

    SHA256

    3884ba731ab4c9f1220eb56aaadd1e946eed8493f6e2d395cebecd4eb056d73b

    SHA512

    5a332a36e2e2e9b547f03bd4c1b73f6d28908ac2f2f78461785084a9e9ffd6a2bbe04ac8fd49cc872cf8d0df38fa0604bf9187ecef50bb1edf0bc4ebb26c70aa

  • \Users\Admin\xaiiw.exe

    Filesize

    100KB

    MD5

    bafe43a7397b4ee361414902538853e5

    SHA1

    ed20391abf1ae115cd09fb4acb3ef923d1ff593e

    SHA256

    3884ba731ab4c9f1220eb56aaadd1e946eed8493f6e2d395cebecd4eb056d73b

    SHA512

    5a332a36e2e2e9b547f03bd4c1b73f6d28908ac2f2f78461785084a9e9ffd6a2bbe04ac8fd49cc872cf8d0df38fa0604bf9187ecef50bb1edf0bc4ebb26c70aa

  • \Users\Admin\xaiiw.exe

    Filesize

    100KB

    MD5

    bafe43a7397b4ee361414902538853e5

    SHA1

    ed20391abf1ae115cd09fb4acb3ef923d1ff593e

    SHA256

    3884ba731ab4c9f1220eb56aaadd1e946eed8493f6e2d395cebecd4eb056d73b

    SHA512

    5a332a36e2e2e9b547f03bd4c1b73f6d28908ac2f2f78461785084a9e9ffd6a2bbe04ac8fd49cc872cf8d0df38fa0604bf9187ecef50bb1edf0bc4ebb26c70aa

  • memory/688-59-0x0000000000000000-mapping.dmp

  • memory/1032-56-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

    Filesize

    8KB