Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 16:57

General

  • Target

    d845ceaab81a33bf6407938c1d4798412290d44a79644c86821d2b9ed8a62ccf.exe

  • Size

    224KB

  • MD5

    12414cfe3aaf9d0957f3519ced587e49

  • SHA1

    811e1a355db8089cae9bd70985478628a5f23491

  • SHA256

    d845ceaab81a33bf6407938c1d4798412290d44a79644c86821d2b9ed8a62ccf

  • SHA512

    74c57ab86e1ef6a352a988b8ebfe8c75c84a37066010829e84a891495d870763df026e3bfc429661dc380ff440d3ef38e0c67f768a9c47221ff9f434465a217b

  • SSDEEP

    3072:FUHQW1D0tQ9nLHbB9W+k9ZJgImCguOelGqk:FUD4QxL7B9W+2JgIPgql

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d845ceaab81a33bf6407938c1d4798412290d44a79644c86821d2b9ed8a62ccf.exe
    "C:\Users\Admin\AppData\Local\Temp\d845ceaab81a33bf6407938c1d4798412290d44a79644c86821d2b9ed8a62ccf.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\neealil.exe
      "C:\Users\Admin\neealil.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1696

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\neealil.exe

          Filesize

          224KB

          MD5

          32f080fe9fdc441e4b84e76dbd5d77d1

          SHA1

          602b58b7de748b41aaa95d02ddda78687fc1173e

          SHA256

          7258e70da1d8e91582e08fe64e5783b23419fa9a70259919aa917889def41c16

          SHA512

          28f020f87aff12a2d36c0e754193f0faf8efca3e53aa5decb241666539baf0155b8a0bf9ef4eba9df68d69c118f06ff83b706589bf50366ef19916b45001a2b8

        • C:\Users\Admin\neealil.exe

          Filesize

          224KB

          MD5

          32f080fe9fdc441e4b84e76dbd5d77d1

          SHA1

          602b58b7de748b41aaa95d02ddda78687fc1173e

          SHA256

          7258e70da1d8e91582e08fe64e5783b23419fa9a70259919aa917889def41c16

          SHA512

          28f020f87aff12a2d36c0e754193f0faf8efca3e53aa5decb241666539baf0155b8a0bf9ef4eba9df68d69c118f06ff83b706589bf50366ef19916b45001a2b8

        • \Users\Admin\neealil.exe

          Filesize

          224KB

          MD5

          32f080fe9fdc441e4b84e76dbd5d77d1

          SHA1

          602b58b7de748b41aaa95d02ddda78687fc1173e

          SHA256

          7258e70da1d8e91582e08fe64e5783b23419fa9a70259919aa917889def41c16

          SHA512

          28f020f87aff12a2d36c0e754193f0faf8efca3e53aa5decb241666539baf0155b8a0bf9ef4eba9df68d69c118f06ff83b706589bf50366ef19916b45001a2b8

        • \Users\Admin\neealil.exe

          Filesize

          224KB

          MD5

          32f080fe9fdc441e4b84e76dbd5d77d1

          SHA1

          602b58b7de748b41aaa95d02ddda78687fc1173e

          SHA256

          7258e70da1d8e91582e08fe64e5783b23419fa9a70259919aa917889def41c16

          SHA512

          28f020f87aff12a2d36c0e754193f0faf8efca3e53aa5decb241666539baf0155b8a0bf9ef4eba9df68d69c118f06ff83b706589bf50366ef19916b45001a2b8

        • memory/1048-69-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/1048-57-0x0000000076171000-0x0000000076173000-memory.dmp

          Filesize

          8KB

        • memory/1048-56-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/1048-65-0x00000000025B0000-0x00000000025EB000-memory.dmp

          Filesize

          236KB

        • memory/1048-66-0x00000000025B0000-0x00000000025EB000-memory.dmp

          Filesize

          236KB

        • memory/1048-70-0x00000000025B0000-0x00000000025EB000-memory.dmp

          Filesize

          236KB

        • memory/1696-67-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/1696-71-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB