Analysis

  • max time kernel
    151s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 00:22

General

  • Target

    a3b8da3b0aa1b3c826814dd34675d4711ebdaea548c6f0ab82f3f4fbf0118a7c.exe

  • Size

    240KB

  • MD5

    3a64fb8501c0a0f95674f693d12732b3

  • SHA1

    43aa89702e249652309cabd2a2b0486241af5d4b

  • SHA256

    a3b8da3b0aa1b3c826814dd34675d4711ebdaea548c6f0ab82f3f4fbf0118a7c

  • SHA512

    b74ddba9c3ad9faeec8b6c117f198a6da37e077409077b6cb64309ff765534564a498b42ef2d957a6f956bdde20a80fc5f0b3433ab5a9c4075bf3307b4f95e0e

  • SSDEEP

    3072:+kNuT8j6VlpvBd90i/SmWKLi7CjFSivnfu3fbMdozt5cztt:+F0UGKGkFRKfeoztO

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3b8da3b0aa1b3c826814dd34675d4711ebdaea548c6f0ab82f3f4fbf0118a7c.exe
    "C:\Users\Admin\AppData\Local\Temp\a3b8da3b0aa1b3c826814dd34675d4711ebdaea548c6f0ab82f3f4fbf0118a7c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\kieogec.exe
      "C:\Users\Admin\kieogec.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kieogec.exe

    Filesize

    240KB

    MD5

    4a2be17273706c47f9973e4a95190f5a

    SHA1

    0c66afb3a36c60619cba9fc9102e728f85307c67

    SHA256

    7ba63bcf0610a87f519dfcd5134275e6adc887123dd6ee3f17e8a3069fac7d2d

    SHA512

    57d17e94e58387e03da507008300ba9c550e1a8b7c069ba090a6d7aafbc220b3695fc7f28692d35034f329d8b13bfe395b7bd8840f316d1f97003d4b3a9c17df

  • C:\Users\Admin\kieogec.exe

    Filesize

    240KB

    MD5

    4a2be17273706c47f9973e4a95190f5a

    SHA1

    0c66afb3a36c60619cba9fc9102e728f85307c67

    SHA256

    7ba63bcf0610a87f519dfcd5134275e6adc887123dd6ee3f17e8a3069fac7d2d

    SHA512

    57d17e94e58387e03da507008300ba9c550e1a8b7c069ba090a6d7aafbc220b3695fc7f28692d35034f329d8b13bfe395b7bd8840f316d1f97003d4b3a9c17df

  • \Users\Admin\kieogec.exe

    Filesize

    240KB

    MD5

    4a2be17273706c47f9973e4a95190f5a

    SHA1

    0c66afb3a36c60619cba9fc9102e728f85307c67

    SHA256

    7ba63bcf0610a87f519dfcd5134275e6adc887123dd6ee3f17e8a3069fac7d2d

    SHA512

    57d17e94e58387e03da507008300ba9c550e1a8b7c069ba090a6d7aafbc220b3695fc7f28692d35034f329d8b13bfe395b7bd8840f316d1f97003d4b3a9c17df

  • \Users\Admin\kieogec.exe

    Filesize

    240KB

    MD5

    4a2be17273706c47f9973e4a95190f5a

    SHA1

    0c66afb3a36c60619cba9fc9102e728f85307c67

    SHA256

    7ba63bcf0610a87f519dfcd5134275e6adc887123dd6ee3f17e8a3069fac7d2d

    SHA512

    57d17e94e58387e03da507008300ba9c550e1a8b7c069ba090a6d7aafbc220b3695fc7f28692d35034f329d8b13bfe395b7bd8840f316d1f97003d4b3a9c17df

  • memory/1720-56-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

    Filesize

    8KB