Analysis

  • max time kernel
    151s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 17:16

General

  • Target

    afd0404b7fa22beb9a8c9b1fb249cb305a17424a4424c02233ea6867e30195cc.exe

  • Size

    192KB

  • MD5

    cd2d80a56db3e7123c7cd4814c047692

  • SHA1

    c6a3d28c713c98a928fac5bd5523ba8a115e5c6a

  • SHA256

    afd0404b7fa22beb9a8c9b1fb249cb305a17424a4424c02233ea6867e30195cc

  • SHA512

    5397c41c6fb2435505410e031be99f22f400079dd44c215f879acdbcb4bb0a46e974c404130e7c7c48546b849942c0f86150b4d1e44b5213ad1275d6ea44b66e

  • SSDEEP

    1536:RbHABQruHlT7idPRi4iti93MH9iV6MRfWzzp3BHReQbIYL2XoPLJB514R9/a7rqr:V2QraTmBRi4itiSHXzp3uYTPLJO8VE

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afd0404b7fa22beb9a8c9b1fb249cb305a17424a4424c02233ea6867e30195cc.exe
    "C:\Users\Admin\AppData\Local\Temp\afd0404b7fa22beb9a8c9b1fb249cb305a17424a4424c02233ea6867e30195cc.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Users\Admin\dekij.exe
      "C:\Users\Admin\dekij.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\dekij.exe

    Filesize

    192KB

    MD5

    173043a0b1ced25ecdb30cd9146670ee

    SHA1

    e2d0c9752fb99c74542db37c8bc61989573ab081

    SHA256

    927f30b1b0c871bce5fe08dabf9e7c1a7ce649878b2e7567fc591c7c4691a10a

    SHA512

    26d3e512ce2b5da362d7c03b60cfa1d5f3d53e8a9eef8c27f5b08c06fb2b427236eff6020fdcaf6972eaf1d9d71209b03727f0e124b3f9e4fea0d357d023b7e1

  • C:\Users\Admin\dekij.exe

    Filesize

    192KB

    MD5

    173043a0b1ced25ecdb30cd9146670ee

    SHA1

    e2d0c9752fb99c74542db37c8bc61989573ab081

    SHA256

    927f30b1b0c871bce5fe08dabf9e7c1a7ce649878b2e7567fc591c7c4691a10a

    SHA512

    26d3e512ce2b5da362d7c03b60cfa1d5f3d53e8a9eef8c27f5b08c06fb2b427236eff6020fdcaf6972eaf1d9d71209b03727f0e124b3f9e4fea0d357d023b7e1

  • \Users\Admin\dekij.exe

    Filesize

    192KB

    MD5

    173043a0b1ced25ecdb30cd9146670ee

    SHA1

    e2d0c9752fb99c74542db37c8bc61989573ab081

    SHA256

    927f30b1b0c871bce5fe08dabf9e7c1a7ce649878b2e7567fc591c7c4691a10a

    SHA512

    26d3e512ce2b5da362d7c03b60cfa1d5f3d53e8a9eef8c27f5b08c06fb2b427236eff6020fdcaf6972eaf1d9d71209b03727f0e124b3f9e4fea0d357d023b7e1

  • \Users\Admin\dekij.exe

    Filesize

    192KB

    MD5

    173043a0b1ced25ecdb30cd9146670ee

    SHA1

    e2d0c9752fb99c74542db37c8bc61989573ab081

    SHA256

    927f30b1b0c871bce5fe08dabf9e7c1a7ce649878b2e7567fc591c7c4691a10a

    SHA512

    26d3e512ce2b5da362d7c03b60cfa1d5f3d53e8a9eef8c27f5b08c06fb2b427236eff6020fdcaf6972eaf1d9d71209b03727f0e124b3f9e4fea0d357d023b7e1

  • memory/956-56-0x0000000076561000-0x0000000076563000-memory.dmp

    Filesize

    8KB

  • memory/1012-59-0x0000000000000000-mapping.dmp