Analysis

  • max time kernel
    151s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 22:56

General

  • Target

    ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe

  • Size

    192KB

  • MD5

    74e623e60efda5cbe2329b07ade8fabf

  • SHA1

    5681e47d358fb9fd2a6fe5f9ee2d4df0a857e0f5

  • SHA256

    ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651

  • SHA512

    04359f386b1d1261ba0210e73d61ac2c45e3d70ece32b1c8b5fa16853d128a36a5e888be9927b0e9f98911364ebb404c8b9dd7f98496037db7e65124706cd39c

  • SSDEEP

    1536:hxHABQruHlTaPRi4iti93MH9iV6MRfWzzp3BHReQbIYL2XoPLJB514R9/dJqi/7:j2QraTIRi4itiSHXzp3uYTPLJOhD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe
    "C:\Users\Admin\AppData\Local\Temp\ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\puuyia.exe
      "C:\Users\Admin\puuyia.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\puuyia.exe

    Filesize

    192KB

    MD5

    5bd9ca4345bc255f7c96834cf8fd6b33

    SHA1

    1ac7ce55fadfe2130bb49765a18fc6eee72d50a7

    SHA256

    96afcd05e374acda925f492ecd042926403efd288a24753286e8571b9914e148

    SHA512

    d58c0439c838c8f34d72ed41bc86197545a8e3a6d286c26eea93e0c20e61759265eac51596d67255e7c811bef79ac76c230bfa3db996ef5c01951fef2a6ec8e3

  • C:\Users\Admin\puuyia.exe

    Filesize

    192KB

    MD5

    5bd9ca4345bc255f7c96834cf8fd6b33

    SHA1

    1ac7ce55fadfe2130bb49765a18fc6eee72d50a7

    SHA256

    96afcd05e374acda925f492ecd042926403efd288a24753286e8571b9914e148

    SHA512

    d58c0439c838c8f34d72ed41bc86197545a8e3a6d286c26eea93e0c20e61759265eac51596d67255e7c811bef79ac76c230bfa3db996ef5c01951fef2a6ec8e3

  • \Users\Admin\puuyia.exe

    Filesize

    192KB

    MD5

    5bd9ca4345bc255f7c96834cf8fd6b33

    SHA1

    1ac7ce55fadfe2130bb49765a18fc6eee72d50a7

    SHA256

    96afcd05e374acda925f492ecd042926403efd288a24753286e8571b9914e148

    SHA512

    d58c0439c838c8f34d72ed41bc86197545a8e3a6d286c26eea93e0c20e61759265eac51596d67255e7c811bef79ac76c230bfa3db996ef5c01951fef2a6ec8e3

  • \Users\Admin\puuyia.exe

    Filesize

    192KB

    MD5

    5bd9ca4345bc255f7c96834cf8fd6b33

    SHA1

    1ac7ce55fadfe2130bb49765a18fc6eee72d50a7

    SHA256

    96afcd05e374acda925f492ecd042926403efd288a24753286e8571b9914e148

    SHA512

    d58c0439c838c8f34d72ed41bc86197545a8e3a6d286c26eea93e0c20e61759265eac51596d67255e7c811bef79ac76c230bfa3db996ef5c01951fef2a6ec8e3

  • memory/956-59-0x0000000000000000-mapping.dmp

  • memory/1972-56-0x00000000751A1000-0x00000000751A3000-memory.dmp

    Filesize

    8KB