Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:50

General

  • Target

    beba31281b7dc94003794887dec8807b1219b978072f6b11aa7cc2266cd10a21.exe

  • Size

    212KB

  • MD5

    319405237b819b26857ee8e3b6846064

  • SHA1

    7c0b62a15465b893688701d1e81878f6eaeb7d9c

  • SHA256

    beba31281b7dc94003794887dec8807b1219b978072f6b11aa7cc2266cd10a21

  • SHA512

    e4058ec9eb20a12d58e3a3d8a02e379bf11f0a079d87580152fdef73f25884689700f7eddbac9bfeb11d37334aafa5810fdee66bca2ce96e2c02ea921836b043

  • SSDEEP

    6144:34dAQlUWF/B/XQSA5g9+plxVSzfuDkZHxpZgyagnZYsHmv+3sH3OU5GGE9EsWR1h:o2QHEgnZYsG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beba31281b7dc94003794887dec8807b1219b978072f6b11aa7cc2266cd10a21.exe
    "C:\Users\Admin\AppData\Local\Temp\beba31281b7dc94003794887dec8807b1219b978072f6b11aa7cc2266cd10a21.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Users\Admin\dilaf.exe
      "C:\Users\Admin\dilaf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\dilaf.exe

    Filesize

    212KB

    MD5

    be653a4039997c4162108e1641c51536

    SHA1

    3fed2807084bb626d1394cdc2907f37766db00a1

    SHA256

    b03906f61d17b7579be009a41d1fc538e3d1fa092eca608de87744f8aa47efe3

    SHA512

    d939915f696e75a8a03223f031869754078fa14ecee5dee63a1ad9492fdb5bf9129be40e4eab29516d40da654c1698a78f0e1a23113283ab22d8c5affddbb14d

  • C:\Users\Admin\dilaf.exe

    Filesize

    212KB

    MD5

    be653a4039997c4162108e1641c51536

    SHA1

    3fed2807084bb626d1394cdc2907f37766db00a1

    SHA256

    b03906f61d17b7579be009a41d1fc538e3d1fa092eca608de87744f8aa47efe3

    SHA512

    d939915f696e75a8a03223f031869754078fa14ecee5dee63a1ad9492fdb5bf9129be40e4eab29516d40da654c1698a78f0e1a23113283ab22d8c5affddbb14d

  • \Users\Admin\dilaf.exe

    Filesize

    212KB

    MD5

    be653a4039997c4162108e1641c51536

    SHA1

    3fed2807084bb626d1394cdc2907f37766db00a1

    SHA256

    b03906f61d17b7579be009a41d1fc538e3d1fa092eca608de87744f8aa47efe3

    SHA512

    d939915f696e75a8a03223f031869754078fa14ecee5dee63a1ad9492fdb5bf9129be40e4eab29516d40da654c1698a78f0e1a23113283ab22d8c5affddbb14d

  • \Users\Admin\dilaf.exe

    Filesize

    212KB

    MD5

    be653a4039997c4162108e1641c51536

    SHA1

    3fed2807084bb626d1394cdc2907f37766db00a1

    SHA256

    b03906f61d17b7579be009a41d1fc538e3d1fa092eca608de87744f8aa47efe3

    SHA512

    d939915f696e75a8a03223f031869754078fa14ecee5dee63a1ad9492fdb5bf9129be40e4eab29516d40da654c1698a78f0e1a23113283ab22d8c5affddbb14d

  • memory/1884-56-0x0000000075E31000-0x0000000075E33000-memory.dmp

    Filesize

    8KB