Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:00

General

  • Target

    a3d2ca4a5da6f91dfd236819186795e17da1718d52b749d7ad54f6b46b91e948.exe

  • Size

    108KB

  • MD5

    4fe03c5f448407797e32391fc1121a7d

  • SHA1

    a329a1afc4ea7912ca3f0d9310b607bed6ff7117

  • SHA256

    a3d2ca4a5da6f91dfd236819186795e17da1718d52b749d7ad54f6b46b91e948

  • SHA512

    71b55cca355ea9a59846fff864b2414a55db9e0d402e170d50a4abb4d8367843e57da07a0e1f0440751b0b67de1985b4da2c8e8b4a2fdc85c842d4ac0e76923b

  • SSDEEP

    1536:sJtVIKiB6oQ7Lh5+sXmNt0ttiPXLq0zTrkB:MUmoIeZt1XTzToB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3d2ca4a5da6f91dfd236819186795e17da1718d52b749d7ad54f6b46b91e948.exe
    "C:\Users\Admin\AppData\Local\Temp\a3d2ca4a5da6f91dfd236819186795e17da1718d52b749d7ad54f6b46b91e948.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\zzsied.exe
      "C:\Users\Admin\zzsied.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zzsied.exe

    Filesize

    108KB

    MD5

    fede2bd8fcf9135156e380dcbfd145f1

    SHA1

    ab53759eb6940954fc589505614b4fc5bf0a96dc

    SHA256

    f6c371d0fd81d67ab39944ab1e3a78f251449c66e4a911c8bfec7e94cbcfa402

    SHA512

    1316471968ee174621ca8b487d4033457dd16df35b0a3b30febad089b9963989ffd5b4d1d683ccd548db2a2277d0cc0ef45c344cfc4b18a801fa64eb1d83c76a

  • C:\Users\Admin\zzsied.exe

    Filesize

    108KB

    MD5

    fede2bd8fcf9135156e380dcbfd145f1

    SHA1

    ab53759eb6940954fc589505614b4fc5bf0a96dc

    SHA256

    f6c371d0fd81d67ab39944ab1e3a78f251449c66e4a911c8bfec7e94cbcfa402

    SHA512

    1316471968ee174621ca8b487d4033457dd16df35b0a3b30febad089b9963989ffd5b4d1d683ccd548db2a2277d0cc0ef45c344cfc4b18a801fa64eb1d83c76a

  • \Users\Admin\zzsied.exe

    Filesize

    108KB

    MD5

    fede2bd8fcf9135156e380dcbfd145f1

    SHA1

    ab53759eb6940954fc589505614b4fc5bf0a96dc

    SHA256

    f6c371d0fd81d67ab39944ab1e3a78f251449c66e4a911c8bfec7e94cbcfa402

    SHA512

    1316471968ee174621ca8b487d4033457dd16df35b0a3b30febad089b9963989ffd5b4d1d683ccd548db2a2277d0cc0ef45c344cfc4b18a801fa64eb1d83c76a

  • \Users\Admin\zzsied.exe

    Filesize

    108KB

    MD5

    fede2bd8fcf9135156e380dcbfd145f1

    SHA1

    ab53759eb6940954fc589505614b4fc5bf0a96dc

    SHA256

    f6c371d0fd81d67ab39944ab1e3a78f251449c66e4a911c8bfec7e94cbcfa402

    SHA512

    1316471968ee174621ca8b487d4033457dd16df35b0a3b30febad089b9963989ffd5b4d1d683ccd548db2a2277d0cc0ef45c344cfc4b18a801fa64eb1d83c76a

  • memory/1600-56-0x0000000076461000-0x0000000076463000-memory.dmp

    Filesize

    8KB