Analysis

  • max time kernel
    187s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 23:34

General

  • Target

    a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe

  • Size

    176KB

  • MD5

    f42442da034fb8ca9cf8ee0e62393604

  • SHA1

    6b6b550226e8378bd7dfae37fb28d113884a2991

  • SHA256

    a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58

  • SHA512

    cc47aa3b41195cfe4caaa30dd42c244207f55f4d7c96bd37809a68f2d6ea2a0a59d527c7b2007eec1e39f8efe407ca499de7562335295c59aa5af31469b340e3

  • SSDEEP

    3072:zdAh8C/nROzg7iiwJvXZETcbLn67kLpyRurohZbsn4KhWNUzMzGV5/bBD3yFL6V5:Wh7YU7iiwJvXZETcbLn6YLProhZbsn4/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 48 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe
    "C:\Users\Admin\AppData\Local\Temp\a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\jieluen.exe
      "C:\Users\Admin\jieluen.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jieluen.exe

    Filesize

    176KB

    MD5

    7dbd21e9622ef6c6009c456ecb5dc23f

    SHA1

    30e556dd72b900cb7933ccbcae94eca42af8440d

    SHA256

    ea3d74b2599de3d64f5fc0ef66a370f29ecac102e4f5daa52d1220dffed6f618

    SHA512

    c148a1f2281d3efe0f04cdf8b1b726cd1a016f8735025592b6b5a83a46fcfd8935566d89ae7023f24c3c1e7b772f28351530916a09a6d62ae71e941cd8366249

  • C:\Users\Admin\jieluen.exe

    Filesize

    176KB

    MD5

    7dbd21e9622ef6c6009c456ecb5dc23f

    SHA1

    30e556dd72b900cb7933ccbcae94eca42af8440d

    SHA256

    ea3d74b2599de3d64f5fc0ef66a370f29ecac102e4f5daa52d1220dffed6f618

    SHA512

    c148a1f2281d3efe0f04cdf8b1b726cd1a016f8735025592b6b5a83a46fcfd8935566d89ae7023f24c3c1e7b772f28351530916a09a6d62ae71e941cd8366249

  • \Users\Admin\jieluen.exe

    Filesize

    176KB

    MD5

    7dbd21e9622ef6c6009c456ecb5dc23f

    SHA1

    30e556dd72b900cb7933ccbcae94eca42af8440d

    SHA256

    ea3d74b2599de3d64f5fc0ef66a370f29ecac102e4f5daa52d1220dffed6f618

    SHA512

    c148a1f2281d3efe0f04cdf8b1b726cd1a016f8735025592b6b5a83a46fcfd8935566d89ae7023f24c3c1e7b772f28351530916a09a6d62ae71e941cd8366249

  • \Users\Admin\jieluen.exe

    Filesize

    176KB

    MD5

    7dbd21e9622ef6c6009c456ecb5dc23f

    SHA1

    30e556dd72b900cb7933ccbcae94eca42af8440d

    SHA256

    ea3d74b2599de3d64f5fc0ef66a370f29ecac102e4f5daa52d1220dffed6f618

    SHA512

    c148a1f2281d3efe0f04cdf8b1b726cd1a016f8735025592b6b5a83a46fcfd8935566d89ae7023f24c3c1e7b772f28351530916a09a6d62ae71e941cd8366249

  • memory/1740-56-0x00000000759C1000-0x00000000759C3000-memory.dmp

    Filesize

    8KB