Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 23:40

General

  • Target

    a970b932c0d08f58bc593eee24d23fa39b9cc1b66eabee755d9087939965d170.exe

  • Size

    156KB

  • MD5

    876d3bba8a0193913b97e88e28c4503c

  • SHA1

    840d4a9b46859d52bfb0277a6a75dc4d419dbaf2

  • SHA256

    a970b932c0d08f58bc593eee24d23fa39b9cc1b66eabee755d9087939965d170

  • SHA512

    d26bec3de3a3c7be252aaf4b46e1518f131cd30f5af3fe99accc6b2037f4c8a0845b20e89709491fb094234d637f4bcdf29ab5b472cdf59c2f6ad2d22fa96bb0

  • SSDEEP

    3072:vsTNiVcx8jeFvB0Z/I8xSFJKAr2CrIL3NoF0:UpIcvqVuJfr2CML3+i

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a970b932c0d08f58bc593eee24d23fa39b9cc1b66eabee755d9087939965d170.exe
    "C:\Users\Admin\AppData\Local\Temp\a970b932c0d08f58bc593eee24d23fa39b9cc1b66eabee755d9087939965d170.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\jhveer.exe
      "C:\Users\Admin\jhveer.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1668

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\jhveer.exe

          Filesize

          156KB

          MD5

          9ff48c1df0ee5d0ee668bd4874ee2b3c

          SHA1

          1a03fdda1f6f56e6d304b5b0ba2e46e220634123

          SHA256

          adb5d5a0775b4def1c94e1506065b9875e9043de627130b4ff01e3846863ae15

          SHA512

          946617f83d8b8f0183afe9f404d5d1dd5ca6e4adf5bbf1886493c70f2d8a1dd439e6a5dae7dcd01c803fc7d19c6dc2ea058a2975aa533250a1dfa0fab03f4070

        • C:\Users\Admin\jhveer.exe

          Filesize

          156KB

          MD5

          9ff48c1df0ee5d0ee668bd4874ee2b3c

          SHA1

          1a03fdda1f6f56e6d304b5b0ba2e46e220634123

          SHA256

          adb5d5a0775b4def1c94e1506065b9875e9043de627130b4ff01e3846863ae15

          SHA512

          946617f83d8b8f0183afe9f404d5d1dd5ca6e4adf5bbf1886493c70f2d8a1dd439e6a5dae7dcd01c803fc7d19c6dc2ea058a2975aa533250a1dfa0fab03f4070

        • \Users\Admin\jhveer.exe

          Filesize

          156KB

          MD5

          9ff48c1df0ee5d0ee668bd4874ee2b3c

          SHA1

          1a03fdda1f6f56e6d304b5b0ba2e46e220634123

          SHA256

          adb5d5a0775b4def1c94e1506065b9875e9043de627130b4ff01e3846863ae15

          SHA512

          946617f83d8b8f0183afe9f404d5d1dd5ca6e4adf5bbf1886493c70f2d8a1dd439e6a5dae7dcd01c803fc7d19c6dc2ea058a2975aa533250a1dfa0fab03f4070

        • \Users\Admin\jhveer.exe

          Filesize

          156KB

          MD5

          9ff48c1df0ee5d0ee668bd4874ee2b3c

          SHA1

          1a03fdda1f6f56e6d304b5b0ba2e46e220634123

          SHA256

          adb5d5a0775b4def1c94e1506065b9875e9043de627130b4ff01e3846863ae15

          SHA512

          946617f83d8b8f0183afe9f404d5d1dd5ca6e4adf5bbf1886493c70f2d8a1dd439e6a5dae7dcd01c803fc7d19c6dc2ea058a2975aa533250a1dfa0fab03f4070

        • memory/1240-56-0x0000000075931000-0x0000000075933000-memory.dmp

          Filesize

          8KB