Analysis

  • max time kernel
    151s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 06:14

General

  • Target

    fb5cfc456eb1da1b1da9f58612c5f23a680ddc9744b1595cdb54a68c23fe514d.exe

  • Size

    272KB

  • MD5

    5772b969d7ad53843bd09f2c0c5bb700

  • SHA1

    e6af1359bff0455fe868ca9f66e9287cbadd8045

  • SHA256

    fb5cfc456eb1da1b1da9f58612c5f23a680ddc9744b1595cdb54a68c23fe514d

  • SHA512

    6c7e1db257cd4584c26e260ba9a409011ab619737806f01e5fc07b7bef496a71eff9c07665d58defd4390a5f90717a88c938ab8d96016b1246096bb1c9741854

  • SSDEEP

    3072:B4f9gmss0FvbVJznCRcz/hVFA9MSs/PLLj+Qm4U3YwgTeA3yR:+2vbfznH7O9G/PLLxU3YwgT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb5cfc456eb1da1b1da9f58612c5f23a680ddc9744b1595cdb54a68c23fe514d.exe
    "C:\Users\Admin\AppData\Local\Temp\fb5cfc456eb1da1b1da9f58612c5f23a680ddc9744b1595cdb54a68c23fe514d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\peugou.exe
      "C:\Users\Admin\peugou.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1272

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\peugou.exe
    Filesize

    272KB

    MD5

    5772b969d7ad53843bd09f2c0c5bb700

    SHA1

    e6af1359bff0455fe868ca9f66e9287cbadd8045

    SHA256

    fb5cfc456eb1da1b1da9f58612c5f23a680ddc9744b1595cdb54a68c23fe514d

    SHA512

    6c7e1db257cd4584c26e260ba9a409011ab619737806f01e5fc07b7bef496a71eff9c07665d58defd4390a5f90717a88c938ab8d96016b1246096bb1c9741854

  • C:\Users\Admin\peugou.exe
    Filesize

    272KB

    MD5

    5772b969d7ad53843bd09f2c0c5bb700

    SHA1

    e6af1359bff0455fe868ca9f66e9287cbadd8045

    SHA256

    fb5cfc456eb1da1b1da9f58612c5f23a680ddc9744b1595cdb54a68c23fe514d

    SHA512

    6c7e1db257cd4584c26e260ba9a409011ab619737806f01e5fc07b7bef496a71eff9c07665d58defd4390a5f90717a88c938ab8d96016b1246096bb1c9741854

  • \Users\Admin\peugou.exe
    Filesize

    272KB

    MD5

    5772b969d7ad53843bd09f2c0c5bb700

    SHA1

    e6af1359bff0455fe868ca9f66e9287cbadd8045

    SHA256

    fb5cfc456eb1da1b1da9f58612c5f23a680ddc9744b1595cdb54a68c23fe514d

    SHA512

    6c7e1db257cd4584c26e260ba9a409011ab619737806f01e5fc07b7bef496a71eff9c07665d58defd4390a5f90717a88c938ab8d96016b1246096bb1c9741854

  • \Users\Admin\peugou.exe
    Filesize

    272KB

    MD5

    5772b969d7ad53843bd09f2c0c5bb700

    SHA1

    e6af1359bff0455fe868ca9f66e9287cbadd8045

    SHA256

    fb5cfc456eb1da1b1da9f58612c5f23a680ddc9744b1595cdb54a68c23fe514d

    SHA512

    6c7e1db257cd4584c26e260ba9a409011ab619737806f01e5fc07b7bef496a71eff9c07665d58defd4390a5f90717a88c938ab8d96016b1246096bb1c9741854

  • memory/1272-59-0x0000000000000000-mapping.dmp
  • memory/1600-56-0x00000000761F1000-0x00000000761F3000-memory.dmp
    Filesize

    8KB

  • memory/1600-65-0x00000000747D1000-0x00000000747D3000-memory.dmp
    Filesize

    8KB