Analysis

  • max time kernel
    151s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 23:40

General

  • Target

    a6188192b9dd86649e7ecc5b97c830cad485f1906c97b7741f19929ccaee9eaf.exe

  • Size

    156KB

  • MD5

    8fe1d9097dfabaea10672031ce1b54af

  • SHA1

    c5095c478d66c113f5a880a8adcc5305bedf9d35

  • SHA256

    a6188192b9dd86649e7ecc5b97c830cad485f1906c97b7741f19929ccaee9eaf

  • SHA512

    99647da613b14dd0969dcda0e734533895ce07fe4545cd9f0482fcbb7db52f41c1b16246864ae7948cc76901121a5624866b02f2d38d9e9a5ac0286da695ed36

  • SSDEEP

    3072:YsTKwVcx8jeFvB0Z/I8xSFJKxr2CrILXNoiX:JKIcvqVuJyr2CMLX+C

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6188192b9dd86649e7ecc5b97c830cad485f1906c97b7741f19929ccaee9eaf.exe
    "C:\Users\Admin\AppData\Local\Temp\a6188192b9dd86649e7ecc5b97c830cad485f1906c97b7741f19929ccaee9eaf.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\saomiv.exe
      "C:\Users\Admin\saomiv.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\saomiv.exe

    Filesize

    156KB

    MD5

    a70c0e2320f5180506e18edb692abe29

    SHA1

    b86cd303fef6d5244a9bd5c359abd533bf677246

    SHA256

    3cfcc9cfd60d470057501a8466675a41efc1bc44c6e5da257f3c98f0c5d1f3dc

    SHA512

    670047aed99a2539e77f8d59632c46834a1c09d9a721be3545ef973c8f5408616266feb0b9c5a0e3955ee2e6e5ca6b0905ba1c679e62bb4558a16b1b60e64cd2

  • C:\Users\Admin\saomiv.exe

    Filesize

    156KB

    MD5

    a70c0e2320f5180506e18edb692abe29

    SHA1

    b86cd303fef6d5244a9bd5c359abd533bf677246

    SHA256

    3cfcc9cfd60d470057501a8466675a41efc1bc44c6e5da257f3c98f0c5d1f3dc

    SHA512

    670047aed99a2539e77f8d59632c46834a1c09d9a721be3545ef973c8f5408616266feb0b9c5a0e3955ee2e6e5ca6b0905ba1c679e62bb4558a16b1b60e64cd2

  • \Users\Admin\saomiv.exe

    Filesize

    156KB

    MD5

    a70c0e2320f5180506e18edb692abe29

    SHA1

    b86cd303fef6d5244a9bd5c359abd533bf677246

    SHA256

    3cfcc9cfd60d470057501a8466675a41efc1bc44c6e5da257f3c98f0c5d1f3dc

    SHA512

    670047aed99a2539e77f8d59632c46834a1c09d9a721be3545ef973c8f5408616266feb0b9c5a0e3955ee2e6e5ca6b0905ba1c679e62bb4558a16b1b60e64cd2

  • \Users\Admin\saomiv.exe

    Filesize

    156KB

    MD5

    a70c0e2320f5180506e18edb692abe29

    SHA1

    b86cd303fef6d5244a9bd5c359abd533bf677246

    SHA256

    3cfcc9cfd60d470057501a8466675a41efc1bc44c6e5da257f3c98f0c5d1f3dc

    SHA512

    670047aed99a2539e77f8d59632c46834a1c09d9a721be3545ef973c8f5408616266feb0b9c5a0e3955ee2e6e5ca6b0905ba1c679e62bb4558a16b1b60e64cd2

  • memory/1324-56-0x0000000075F51000-0x0000000075F53000-memory.dmp

    Filesize

    8KB