Analysis

  • max time kernel
    150s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:41

General

  • Target

    5788025cc445442e88e903d8db1a3f3e59978d8afadb4949bfd6ee73b68536ef.exe

  • Size

    5.6MB

  • MD5

    dd1048bca68ae8299a23f1e8284f3f5b

  • SHA1

    c20e8e404d7c4d78c971e4cac0d043f1c2845233

  • SHA256

    5788025cc445442e88e903d8db1a3f3e59978d8afadb4949bfd6ee73b68536ef

  • SHA512

    79116d43b2da4369fc5680b3e2562e36ad92f9ea45b148c2eb4549ba60f75cfa9b95546171245696553420038111f66c18e4dad746e201fd13f94d69ceade904

  • SSDEEP

    98304:K9f7xVywvzahJDOZdOLnWrLEJm2b6YtwK/KnryxDnLjtRJEedAHoQqlB93kKx8U+:8fFWhJD8WnIEJm2b6YwkKnryp3aH5qlm

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5788025cc445442e88e903d8db1a3f3e59978d8afadb4949bfd6ee73b68536ef.exe
    "C:\Users\Admin\AppData\Local\Temp\5788025cc445442e88e903d8db1a3f3e59978d8afadb4949bfd6ee73b68536ef.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\5788025cc445442e88e903d8db1a3f3e59978d8afadb4949bfd6ee73b68536ef.exe
      "C:\Users\Admin\AppData\Local\Temp\5788025cc445442e88e903d8db1a3f3e59978d8afadb4949bfd6ee73b68536ef.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/988-54-0x0000000000400000-0x00000000005CD000-memory.dmp

    Filesize

    1.8MB

  • memory/988-56-0x0000000000400000-0x00000000005CD000-memory.dmp

    Filesize

    1.8MB

  • memory/988-57-0x0000000000400000-0x00000000005CD000-memory.dmp

    Filesize

    1.8MB

  • memory/988-58-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB

  • memory/988-59-0x0000000000400000-0x00000000005CD000-memory.dmp

    Filesize

    1.8MB