Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 00:09

General

  • Target

    4976612686de2626003b9f5b6c16a1acc193d53e377ec7a5a2e53c9b0a4b02b1.exe

  • Size

    224KB

  • MD5

    1d8d57dd8b1a80e2d7002abc9b08f420

  • SHA1

    d25ed7d76c1528669b0afa9782f35ea5888afe3c

  • SHA256

    4976612686de2626003b9f5b6c16a1acc193d53e377ec7a5a2e53c9b0a4b02b1

  • SHA512

    55eae516d030996d696a7f1cc783d2a82198df32ee5bb767db903abc74703f52c9da3c0313881c9fe8a3604c86943eaeaa2ca62d7f34f33c5863a7c3ae20c2c4

  • SSDEEP

    3072:MXyqNsMoBuaZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax2+l:TqN5yp4LnbmlrZW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4976612686de2626003b9f5b6c16a1acc193d53e377ec7a5a2e53c9b0a4b02b1.exe
    "C:\Users\Admin\AppData\Local\Temp\4976612686de2626003b9f5b6c16a1acc193d53e377ec7a5a2e53c9b0a4b02b1.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\rltob.exe
      "C:\Users\Admin\rltob.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rltob.exe

    Filesize

    224KB

    MD5

    b1e0fdc2692805d45b091a6488a41d06

    SHA1

    5088ac972d478c0b58eae14766f63d42002e3218

    SHA256

    46ff54e5d4b11c50e06db4ec13eac038efa914f54843244882d0cf0c9c30996b

    SHA512

    8adae438085f4fc5d8fac1a80df65e20650aef7f2095cac223b1baa94bf29e00edccb64382fe2148a66689fd661f15b5268cb5328c4cbff6e85b778caf138345

  • C:\Users\Admin\rltob.exe

    Filesize

    224KB

    MD5

    b1e0fdc2692805d45b091a6488a41d06

    SHA1

    5088ac972d478c0b58eae14766f63d42002e3218

    SHA256

    46ff54e5d4b11c50e06db4ec13eac038efa914f54843244882d0cf0c9c30996b

    SHA512

    8adae438085f4fc5d8fac1a80df65e20650aef7f2095cac223b1baa94bf29e00edccb64382fe2148a66689fd661f15b5268cb5328c4cbff6e85b778caf138345

  • \Users\Admin\rltob.exe

    Filesize

    224KB

    MD5

    b1e0fdc2692805d45b091a6488a41d06

    SHA1

    5088ac972d478c0b58eae14766f63d42002e3218

    SHA256

    46ff54e5d4b11c50e06db4ec13eac038efa914f54843244882d0cf0c9c30996b

    SHA512

    8adae438085f4fc5d8fac1a80df65e20650aef7f2095cac223b1baa94bf29e00edccb64382fe2148a66689fd661f15b5268cb5328c4cbff6e85b778caf138345

  • \Users\Admin\rltob.exe

    Filesize

    224KB

    MD5

    b1e0fdc2692805d45b091a6488a41d06

    SHA1

    5088ac972d478c0b58eae14766f63d42002e3218

    SHA256

    46ff54e5d4b11c50e06db4ec13eac038efa914f54843244882d0cf0c9c30996b

    SHA512

    8adae438085f4fc5d8fac1a80df65e20650aef7f2095cac223b1baa94bf29e00edccb64382fe2148a66689fd661f15b5268cb5328c4cbff6e85b778caf138345

  • memory/1292-56-0x00000000762E1000-0x00000000762E3000-memory.dmp

    Filesize

    8KB