Analysis

  • max time kernel
    150s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 22:30

General

  • Target

    ed009bab00f992690ac73dd674a1f1e3580c0473f5be254a71ee8b446186ab2d.exe

  • Size

    192KB

  • MD5

    45b98dde508a1a7ecdf1918f0c42eeaf

  • SHA1

    0afa17b8b6ee48c99b9bc63928860d9f5dce77ab

  • SHA256

    ed009bab00f992690ac73dd674a1f1e3580c0473f5be254a71ee8b446186ab2d

  • SHA512

    e815db468de7f1a876e0b4fa4f65ece5c6036a734880007fc4eaf23652eab1839b7252785ed326258ea71e78c6c5e236acc07c748e57abda78dabfddb8d846a6

  • SSDEEP

    1536:0Wci2Oan+aaaaat031AdQWB5kCFrWszRUOHFlQhzyLwVKftfVBiZHAPloFp5A2mh:SOfW3kCFrWsF2eLbqx2Y94sUX/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed009bab00f992690ac73dd674a1f1e3580c0473f5be254a71ee8b446186ab2d.exe
    "C:\Users\Admin\AppData\Local\Temp\ed009bab00f992690ac73dd674a1f1e3580c0473f5be254a71ee8b446186ab2d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\dcxig.exe
      "C:\Users\Admin\dcxig.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\dcxig.exe

    Filesize

    192KB

    MD5

    c72bad2da5863ab62a42f9716427bd55

    SHA1

    ee7880e847e5b4ae8a6e851764c4068c84afcac2

    SHA256

    d4faa689ac2d20e8da56ac062f26673040d11830e03d57cd97e35e6fca79037e

    SHA512

    f9c1f2275726d048b6baf895b8f9700d7bc7587bd09dc292275ff628545f79686b37f90d175b3f3a75e652702b17e252512a4ac2ed497a4f75cf2e99aea9a0b1

  • C:\Users\Admin\dcxig.exe

    Filesize

    192KB

    MD5

    c72bad2da5863ab62a42f9716427bd55

    SHA1

    ee7880e847e5b4ae8a6e851764c4068c84afcac2

    SHA256

    d4faa689ac2d20e8da56ac062f26673040d11830e03d57cd97e35e6fca79037e

    SHA512

    f9c1f2275726d048b6baf895b8f9700d7bc7587bd09dc292275ff628545f79686b37f90d175b3f3a75e652702b17e252512a4ac2ed497a4f75cf2e99aea9a0b1

  • \Users\Admin\dcxig.exe

    Filesize

    192KB

    MD5

    c72bad2da5863ab62a42f9716427bd55

    SHA1

    ee7880e847e5b4ae8a6e851764c4068c84afcac2

    SHA256

    d4faa689ac2d20e8da56ac062f26673040d11830e03d57cd97e35e6fca79037e

    SHA512

    f9c1f2275726d048b6baf895b8f9700d7bc7587bd09dc292275ff628545f79686b37f90d175b3f3a75e652702b17e252512a4ac2ed497a4f75cf2e99aea9a0b1

  • \Users\Admin\dcxig.exe

    Filesize

    192KB

    MD5

    c72bad2da5863ab62a42f9716427bd55

    SHA1

    ee7880e847e5b4ae8a6e851764c4068c84afcac2

    SHA256

    d4faa689ac2d20e8da56ac062f26673040d11830e03d57cd97e35e6fca79037e

    SHA512

    f9c1f2275726d048b6baf895b8f9700d7bc7587bd09dc292275ff628545f79686b37f90d175b3f3a75e652702b17e252512a4ac2ed497a4f75cf2e99aea9a0b1

  • memory/1672-56-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

    Filesize

    8KB