Analysis

  • max time kernel
    151s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 23:28

General

  • Target

    b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe

  • Size

    148KB

  • MD5

    e9dd7112c2ff1cf64002fc6fe139cb79

  • SHA1

    c13acde170be20e99682f6bc3f128f6f0c004bd9

  • SHA256

    b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0

  • SHA512

    bd500433a99e482eeffb75fbebfe724a90c282ae431b74a313e6fc895c037334e61bbb6790dc58cf1993532bb1252d98e7a3d4c194b9aa56aa70227292e5c535

  • SSDEEP

    3072:Qdo+sgRs59j/pvkqBBac+RAGq1bg7Yfgst6OzOS79pgRZkhQJAOAU4oQZiESV5n:eoZbj/pvkqBBac+RAGq1bZHtrzOS77kT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe
    "C:\Users\Admin\AppData\Local\Temp\b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\pzvaig.exe
      "C:\Users\Admin\pzvaig.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\pzvaig.exe

    Filesize

    148KB

    MD5

    55494a005286358f3e84f690eec9bc87

    SHA1

    718dd87dd2d9e135b717cf86a3c1d29199185f24

    SHA256

    1a1dde6e91c4f5c0f7047b446abf710cf993d7a287f4fa2cc325fcf8eb942f60

    SHA512

    534ac0f222f50f2a007e0ad320211d05287cc11aa7ff5d170f89301c0b4268333bd5c4a392cd7ea2a21c7d25470fe89e74276c238f8393a21d7381236082a7df

  • C:\Users\Admin\pzvaig.exe

    Filesize

    148KB

    MD5

    55494a005286358f3e84f690eec9bc87

    SHA1

    718dd87dd2d9e135b717cf86a3c1d29199185f24

    SHA256

    1a1dde6e91c4f5c0f7047b446abf710cf993d7a287f4fa2cc325fcf8eb942f60

    SHA512

    534ac0f222f50f2a007e0ad320211d05287cc11aa7ff5d170f89301c0b4268333bd5c4a392cd7ea2a21c7d25470fe89e74276c238f8393a21d7381236082a7df

  • \Users\Admin\pzvaig.exe

    Filesize

    148KB

    MD5

    55494a005286358f3e84f690eec9bc87

    SHA1

    718dd87dd2d9e135b717cf86a3c1d29199185f24

    SHA256

    1a1dde6e91c4f5c0f7047b446abf710cf993d7a287f4fa2cc325fcf8eb942f60

    SHA512

    534ac0f222f50f2a007e0ad320211d05287cc11aa7ff5d170f89301c0b4268333bd5c4a392cd7ea2a21c7d25470fe89e74276c238f8393a21d7381236082a7df

  • \Users\Admin\pzvaig.exe

    Filesize

    148KB

    MD5

    55494a005286358f3e84f690eec9bc87

    SHA1

    718dd87dd2d9e135b717cf86a3c1d29199185f24

    SHA256

    1a1dde6e91c4f5c0f7047b446abf710cf993d7a287f4fa2cc325fcf8eb942f60

    SHA512

    534ac0f222f50f2a007e0ad320211d05287cc11aa7ff5d170f89301c0b4268333bd5c4a392cd7ea2a21c7d25470fe89e74276c238f8393a21d7381236082a7df

  • memory/1960-56-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB