Analysis

  • max time kernel
    226s
  • max time network
    252s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:17

General

  • Target

    764eeede0a54e0b2b110e695a0795a9f19b0bd661ab491ca29fa550cb55b4472.exe

  • Size

    204KB

  • MD5

    fadcf0429b53e3c6381e6d0046e7722e

  • SHA1

    90842ecb410d8268d7f9d5c46f240caaf96739a1

  • SHA256

    764eeede0a54e0b2b110e695a0795a9f19b0bd661ab491ca29fa550cb55b4472

  • SHA512

    aa5e17d98f0aafed56d926ed2180ccfadd35c89c5f8830792be381d7c8cf0e56c8044fb7fa9c6d2cb103ffddbc5bb7b527a080b0cb5b4f998d57c40ae4f13111

  • SSDEEP

    3072:XmIW8AF0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUW2PN:Wd14QxL7B9W0c1RCzR/fSmlF1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\764eeede0a54e0b2b110e695a0795a9f19b0bd661ab491ca29fa550cb55b4472.exe
    "C:\Users\Admin\AppData\Local\Temp\764eeede0a54e0b2b110e695a0795a9f19b0bd661ab491ca29fa550cb55b4472.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\faece.exe
      "C:\Users\Admin\faece.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\faece.exe

    Filesize

    204KB

    MD5

    3108e6146670b24eaf11624771f346c4

    SHA1

    740611ea4ed41a009e6d02ca9d0c84924ae90b8e

    SHA256

    1fa5775cb9f450190a36643dd2c9fee600441daac0a9a2c073ecbdc2e17d84ed

    SHA512

    dce42ec039f74007111041629c2585a38774b164b86a4d52a15fd446c5999c03580700dc2312f06ce140bc756bbf0a98f36eaf995458b3ec402662816370bc05

  • C:\Users\Admin\faece.exe

    Filesize

    204KB

    MD5

    3108e6146670b24eaf11624771f346c4

    SHA1

    740611ea4ed41a009e6d02ca9d0c84924ae90b8e

    SHA256

    1fa5775cb9f450190a36643dd2c9fee600441daac0a9a2c073ecbdc2e17d84ed

    SHA512

    dce42ec039f74007111041629c2585a38774b164b86a4d52a15fd446c5999c03580700dc2312f06ce140bc756bbf0a98f36eaf995458b3ec402662816370bc05

  • \Users\Admin\faece.exe

    Filesize

    204KB

    MD5

    3108e6146670b24eaf11624771f346c4

    SHA1

    740611ea4ed41a009e6d02ca9d0c84924ae90b8e

    SHA256

    1fa5775cb9f450190a36643dd2c9fee600441daac0a9a2c073ecbdc2e17d84ed

    SHA512

    dce42ec039f74007111041629c2585a38774b164b86a4d52a15fd446c5999c03580700dc2312f06ce140bc756bbf0a98f36eaf995458b3ec402662816370bc05

  • \Users\Admin\faece.exe

    Filesize

    204KB

    MD5

    3108e6146670b24eaf11624771f346c4

    SHA1

    740611ea4ed41a009e6d02ca9d0c84924ae90b8e

    SHA256

    1fa5775cb9f450190a36643dd2c9fee600441daac0a9a2c073ecbdc2e17d84ed

    SHA512

    dce42ec039f74007111041629c2585a38774b164b86a4d52a15fd446c5999c03580700dc2312f06ce140bc756bbf0a98f36eaf995458b3ec402662816370bc05

  • memory/948-56-0x0000000075D51000-0x0000000075D53000-memory.dmp

    Filesize

    8KB