Analysis

  • max time kernel
    150s
  • max time network
    70s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 22:29

General

  • Target

    f599b98ad811fb89b939164dea9cd58c9797bcbdcf772893ac1b905f5c370836.exe

  • Size

    107KB

  • MD5

    1524080f59294015d72812fd5459aa60

  • SHA1

    e427bf721e156e4f5aae9827875685944aa6bcff

  • SHA256

    f599b98ad811fb89b939164dea9cd58c9797bcbdcf772893ac1b905f5c370836

  • SHA512

    ab24ffea29457b0d5bb05ac7a3db84a7bd1d3839dd968499f2075c3516c019ee8187fb6cc80a0ce4a6a49aa5fbb0864bfece4d8778e353e1d9eda0b7e7eabc2a

  • SSDEEP

    1536:OzfFficGC29AzRg1MbKSIV+JT/B3OkAO16/3gkLBbocGkM5hFg0z/tEKxeaEmxAJ:OLOE9JbOV2T/B3TktCjevjabxVba9PA4

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f599b98ad811fb89b939164dea9cd58c9797bcbdcf772893ac1b905f5c370836.exe
    "C:\Users\Admin\AppData\Local\Temp\f599b98ad811fb89b939164dea9cd58c9797bcbdcf772893ac1b905f5c370836.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\f599b98ad811fb89b939164dea9cd58c9797bcbdcf772893ac1b905f5c370836.exe
      71
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Loads dropped DLL
      • Adds Run key to start application
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Users\Admin\beiaqeg.exe
        "C:\Users\Admin\beiaqeg.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Users\Admin\beiaqeg.exe
          71
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Maps connected drives based on registry
          • Drops autorun.inf file
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\beiaqeg.exe

    Filesize

    107KB

    MD5

    1524080f59294015d72812fd5459aa60

    SHA1

    e427bf721e156e4f5aae9827875685944aa6bcff

    SHA256

    f599b98ad811fb89b939164dea9cd58c9797bcbdcf772893ac1b905f5c370836

    SHA512

    ab24ffea29457b0d5bb05ac7a3db84a7bd1d3839dd968499f2075c3516c019ee8187fb6cc80a0ce4a6a49aa5fbb0864bfece4d8778e353e1d9eda0b7e7eabc2a

  • C:\Users\Admin\beiaqeg.exe

    Filesize

    107KB

    MD5

    1524080f59294015d72812fd5459aa60

    SHA1

    e427bf721e156e4f5aae9827875685944aa6bcff

    SHA256

    f599b98ad811fb89b939164dea9cd58c9797bcbdcf772893ac1b905f5c370836

    SHA512

    ab24ffea29457b0d5bb05ac7a3db84a7bd1d3839dd968499f2075c3516c019ee8187fb6cc80a0ce4a6a49aa5fbb0864bfece4d8778e353e1d9eda0b7e7eabc2a

  • C:\Users\Admin\beiaqeg.exe

    Filesize

    107KB

    MD5

    1524080f59294015d72812fd5459aa60

    SHA1

    e427bf721e156e4f5aae9827875685944aa6bcff

    SHA256

    f599b98ad811fb89b939164dea9cd58c9797bcbdcf772893ac1b905f5c370836

    SHA512

    ab24ffea29457b0d5bb05ac7a3db84a7bd1d3839dd968499f2075c3516c019ee8187fb6cc80a0ce4a6a49aa5fbb0864bfece4d8778e353e1d9eda0b7e7eabc2a

  • \Users\Admin\beiaqeg.exe

    Filesize

    107KB

    MD5

    1524080f59294015d72812fd5459aa60

    SHA1

    e427bf721e156e4f5aae9827875685944aa6bcff

    SHA256

    f599b98ad811fb89b939164dea9cd58c9797bcbdcf772893ac1b905f5c370836

    SHA512

    ab24ffea29457b0d5bb05ac7a3db84a7bd1d3839dd968499f2075c3516c019ee8187fb6cc80a0ce4a6a49aa5fbb0864bfece4d8778e353e1d9eda0b7e7eabc2a

  • \Users\Admin\beiaqeg.exe

    Filesize

    107KB

    MD5

    1524080f59294015d72812fd5459aa60

    SHA1

    e427bf721e156e4f5aae9827875685944aa6bcff

    SHA256

    f599b98ad811fb89b939164dea9cd58c9797bcbdcf772893ac1b905f5c370836

    SHA512

    ab24ffea29457b0d5bb05ac7a3db84a7bd1d3839dd968499f2075c3516c019ee8187fb6cc80a0ce4a6a49aa5fbb0864bfece4d8778e353e1d9eda0b7e7eabc2a

  • memory/948-56-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/948-63-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/948-62-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/948-59-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/948-80-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/980-78-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/980-81-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB