Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 00:05

General

  • Target

    f5527dd12e4e0d7b1d67c21773cd8d602b045b4aef94d36f1e5f238c629ba8d6.exe

  • Size

    253KB

  • MD5

    2ea599521d2dfbc2a77ee7ac9a250cb0

  • SHA1

    ab4039b9117750f907e1e09198b76c5460211236

  • SHA256

    f5527dd12e4e0d7b1d67c21773cd8d602b045b4aef94d36f1e5f238c629ba8d6

  • SHA512

    2b240eed25a674e6e33f64bb871fc1358e4fadcc42c68e6bbd357754cb603654d19fa3e42d123e2d6c53d837b558a6a81ec7bc05987b5d0bdcd1b6eb3097ca97

  • SSDEEP

    3072:We+5S0FPa17Nq0b6bdl7EuiatZJzB71kdLcTkCSQVEiWxFH0Jn4:N+cK47j6bdlAuTF782MiWxFHD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5527dd12e4e0d7b1d67c21773cd8d602b045b4aef94d36f1e5f238c629ba8d6.exe
    "C:\Users\Admin\AppData\Local\Temp\f5527dd12e4e0d7b1d67c21773cd8d602b045b4aef94d36f1e5f238c629ba8d6.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\boeyi.exe
      "C:\Users\Admin\boeyi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1288

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\boeyi.exe

          Filesize

          253KB

          MD5

          2ea599521d2dfbc2a77ee7ac9a250cb0

          SHA1

          ab4039b9117750f907e1e09198b76c5460211236

          SHA256

          f5527dd12e4e0d7b1d67c21773cd8d602b045b4aef94d36f1e5f238c629ba8d6

          SHA512

          2b240eed25a674e6e33f64bb871fc1358e4fadcc42c68e6bbd357754cb603654d19fa3e42d123e2d6c53d837b558a6a81ec7bc05987b5d0bdcd1b6eb3097ca97

        • C:\Users\Admin\boeyi.exe

          Filesize

          253KB

          MD5

          2ea599521d2dfbc2a77ee7ac9a250cb0

          SHA1

          ab4039b9117750f907e1e09198b76c5460211236

          SHA256

          f5527dd12e4e0d7b1d67c21773cd8d602b045b4aef94d36f1e5f238c629ba8d6

          SHA512

          2b240eed25a674e6e33f64bb871fc1358e4fadcc42c68e6bbd357754cb603654d19fa3e42d123e2d6c53d837b558a6a81ec7bc05987b5d0bdcd1b6eb3097ca97

        • \Users\Admin\boeyi.exe

          Filesize

          253KB

          MD5

          2ea599521d2dfbc2a77ee7ac9a250cb0

          SHA1

          ab4039b9117750f907e1e09198b76c5460211236

          SHA256

          f5527dd12e4e0d7b1d67c21773cd8d602b045b4aef94d36f1e5f238c629ba8d6

          SHA512

          2b240eed25a674e6e33f64bb871fc1358e4fadcc42c68e6bbd357754cb603654d19fa3e42d123e2d6c53d837b558a6a81ec7bc05987b5d0bdcd1b6eb3097ca97

        • \Users\Admin\boeyi.exe

          Filesize

          253KB

          MD5

          2ea599521d2dfbc2a77ee7ac9a250cb0

          SHA1

          ab4039b9117750f907e1e09198b76c5460211236

          SHA256

          f5527dd12e4e0d7b1d67c21773cd8d602b045b4aef94d36f1e5f238c629ba8d6

          SHA512

          2b240eed25a674e6e33f64bb871fc1358e4fadcc42c68e6bbd357754cb603654d19fa3e42d123e2d6c53d837b558a6a81ec7bc05987b5d0bdcd1b6eb3097ca97

        • memory/996-56-0x00000000760E1000-0x00000000760E3000-memory.dmp

          Filesize

          8KB

        • memory/996-64-0x0000000073FE1000-0x0000000073FE3000-memory.dmp

          Filesize

          8KB