Analysis

  • max time kernel
    169s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 23:42

General

  • Target

    c7402d688476924706b6f455fecfffed7c06fedeada88457c937e60bc5c0851c.exe

  • Size

    96KB

  • MD5

    719b86c96b23ce887f918a347d369342

  • SHA1

    8c06f0a3fda6f5fe775fce937c3a02a15f41378e

  • SHA256

    c7402d688476924706b6f455fecfffed7c06fedeada88457c937e60bc5c0851c

  • SHA512

    2f1bd3886109fe7b12158ab833a49ca7a81ef76f5da68b500e622604b71891c8a01c45cab9e4d664a067f6280b9ffb792f93067b3d08c18582a9e7a84436361e

  • SSDEEP

    1536:fjvEg52N9tyVQO8P8ychukDwjj3RJNEo/knRzdnynE7RldNEP8lijOe/NIjP:fDE/NelychMzR3Ek65Rldq/CP

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7402d688476924706b6f455fecfffed7c06fedeada88457c937e60bc5c0851c.exe
    "C:\Users\Admin\AppData\Local\Temp\c7402d688476924706b6f455fecfffed7c06fedeada88457c937e60bc5c0851c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\kjvieq.exe
      "C:\Users\Admin\kjvieq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kjvieq.exe

    Filesize

    96KB

    MD5

    9348ff9a522a8333affa1ddf3a71b25b

    SHA1

    e5f204df3234dc0eb793af7a5228074cad5e57ba

    SHA256

    2d03a05032eed7b51d94a575f26d501cca5804cd034ae625b1fcd867a180ea5d

    SHA512

    93b0377518fbbdfa7436c426c1dcf564539f1986fb697bc7cd593b329b46df045333fef2e2da5b06c97ee47bd525a097ea10c42fbf65c0fb4d6dcfd57d201bee

  • C:\Users\Admin\kjvieq.exe

    Filesize

    96KB

    MD5

    9348ff9a522a8333affa1ddf3a71b25b

    SHA1

    e5f204df3234dc0eb793af7a5228074cad5e57ba

    SHA256

    2d03a05032eed7b51d94a575f26d501cca5804cd034ae625b1fcd867a180ea5d

    SHA512

    93b0377518fbbdfa7436c426c1dcf564539f1986fb697bc7cd593b329b46df045333fef2e2da5b06c97ee47bd525a097ea10c42fbf65c0fb4d6dcfd57d201bee

  • \Users\Admin\kjvieq.exe

    Filesize

    96KB

    MD5

    9348ff9a522a8333affa1ddf3a71b25b

    SHA1

    e5f204df3234dc0eb793af7a5228074cad5e57ba

    SHA256

    2d03a05032eed7b51d94a575f26d501cca5804cd034ae625b1fcd867a180ea5d

    SHA512

    93b0377518fbbdfa7436c426c1dcf564539f1986fb697bc7cd593b329b46df045333fef2e2da5b06c97ee47bd525a097ea10c42fbf65c0fb4d6dcfd57d201bee

  • \Users\Admin\kjvieq.exe

    Filesize

    96KB

    MD5

    9348ff9a522a8333affa1ddf3a71b25b

    SHA1

    e5f204df3234dc0eb793af7a5228074cad5e57ba

    SHA256

    2d03a05032eed7b51d94a575f26d501cca5804cd034ae625b1fcd867a180ea5d

    SHA512

    93b0377518fbbdfa7436c426c1dcf564539f1986fb697bc7cd593b329b46df045333fef2e2da5b06c97ee47bd525a097ea10c42fbf65c0fb4d6dcfd57d201bee

  • memory/864-56-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB