Analysis

  • max time kernel
    150s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 00:42

General

  • Target

    a98f1814bc0fdd9fc52232edcc4abac6ac0f0933a4b10846710c701a0db9851f.exe

  • Size

    276KB

  • MD5

    77dff1b57a841f05b3a59cdd3c0f1625

  • SHA1

    665dd060614f533b8c90b27143920d2040b89f3e

  • SHA256

    a98f1814bc0fdd9fc52232edcc4abac6ac0f0933a4b10846710c701a0db9851f

  • SHA512

    6baa85577be0a060caa63aa52369876bdc24f20f06c8b593addd08741b95d27463fb7a484e472ddabdd154fed72196286c8d84afc62f572ab3f9bf7f84932356

  • SSDEEP

    3072:HCWTo/0Yx+0tQ9nLHbB9WPliBs2HWWEakGJm9BsP3g:HCPM4QxL7B9WPli+yWWEaziL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a98f1814bc0fdd9fc52232edcc4abac6ac0f0933a4b10846710c701a0db9851f.exe
    "C:\Users\Admin\AppData\Local\Temp\a98f1814bc0fdd9fc52232edcc4abac6ac0f0933a4b10846710c701a0db9851f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\poezi.exe
      "C:\Users\Admin\poezi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1740

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\poezi.exe

          Filesize

          276KB

          MD5

          76f4c94abc7149a6b8494260a37da8e1

          SHA1

          b6ec5cdf1b497e8ab69bed2f010bcbd8875d9f15

          SHA256

          89937b05185064244de2d7a41cb64c634c9901fde78846be692b9ffdbbb35cde

          SHA512

          73f35b8cbf41ead9e2ed9c464f9f1b78684218f8e7a0e31a3039bab0049d44645b44f85345e2a3540d92f02cd193903ab15b29b0a505efb70db1b9aa9edf6853

        • C:\Users\Admin\poezi.exe

          Filesize

          276KB

          MD5

          76f4c94abc7149a6b8494260a37da8e1

          SHA1

          b6ec5cdf1b497e8ab69bed2f010bcbd8875d9f15

          SHA256

          89937b05185064244de2d7a41cb64c634c9901fde78846be692b9ffdbbb35cde

          SHA512

          73f35b8cbf41ead9e2ed9c464f9f1b78684218f8e7a0e31a3039bab0049d44645b44f85345e2a3540d92f02cd193903ab15b29b0a505efb70db1b9aa9edf6853

        • \Users\Admin\poezi.exe

          Filesize

          276KB

          MD5

          76f4c94abc7149a6b8494260a37da8e1

          SHA1

          b6ec5cdf1b497e8ab69bed2f010bcbd8875d9f15

          SHA256

          89937b05185064244de2d7a41cb64c634c9901fde78846be692b9ffdbbb35cde

          SHA512

          73f35b8cbf41ead9e2ed9c464f9f1b78684218f8e7a0e31a3039bab0049d44645b44f85345e2a3540d92f02cd193903ab15b29b0a505efb70db1b9aa9edf6853

        • \Users\Admin\poezi.exe

          Filesize

          276KB

          MD5

          76f4c94abc7149a6b8494260a37da8e1

          SHA1

          b6ec5cdf1b497e8ab69bed2f010bcbd8875d9f15

          SHA256

          89937b05185064244de2d7a41cb64c634c9901fde78846be692b9ffdbbb35cde

          SHA512

          73f35b8cbf41ead9e2ed9c464f9f1b78684218f8e7a0e31a3039bab0049d44645b44f85345e2a3540d92f02cd193903ab15b29b0a505efb70db1b9aa9edf6853

        • memory/1740-66-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/1740-69-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/1996-56-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/1996-57-0x0000000075281000-0x0000000075283000-memory.dmp

          Filesize

          8KB

        • memory/1996-65-0x0000000002DC0000-0x0000000002DFA000-memory.dmp

          Filesize

          232KB

        • memory/1996-68-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB