Analysis

  • max time kernel
    151s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 19:22

General

  • Target

    ac22b9169534a79c4d589e26b976f5581bbb8c20d924630d0be62a0bdbe1ff74.exe

  • Size

    228KB

  • MD5

    ed54f0f4ddedd6bf06745d2b041ca10e

  • SHA1

    0f7194e99ca51f8c6e4f4a5d76f3c3a086418923

  • SHA256

    ac22b9169534a79c4d589e26b976f5581bbb8c20d924630d0be62a0bdbe1ff74

  • SHA512

    2eda41135bf8f3beb96f08af3e78123ccb7b833a058bf71e8a521ebce4f7a59eae2afbf4f4bac7cfa3a5ace0a6a56e768336d660f702af0694b2d313642b4f5f

  • SSDEEP

    6144:5K+U3dwqsNy5ibpNjlDEqxF6snji81RUinKNCFe:s+OdQxl2

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac22b9169534a79c4d589e26b976f5581bbb8c20d924630d0be62a0bdbe1ff74.exe
    "C:\Users\Admin\AppData\Local\Temp\ac22b9169534a79c4d589e26b976f5581bbb8c20d924630d0be62a0bdbe1ff74.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\hvxoid.exe
      "C:\Users\Admin\hvxoid.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:820

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\hvxoid.exe

          Filesize

          228KB

          MD5

          a11a47c8292c83e7d3287c623b1fb80b

          SHA1

          463f2b4e0d0cef34e30ae1e6c3d9144592ad564f

          SHA256

          0799c603b2f004099f344e2e6b51ef1f07585fbcc8d73771019341f97b150931

          SHA512

          e637c77b472b96b3de277a970189a60779e8c118c6641c455c254de04441d257fd0f14f40761aa6c3b1528c8385b6226e0b0e3cda56e6c6b2dfb137b9ace40bd

        • C:\Users\Admin\hvxoid.exe

          Filesize

          228KB

          MD5

          a11a47c8292c83e7d3287c623b1fb80b

          SHA1

          463f2b4e0d0cef34e30ae1e6c3d9144592ad564f

          SHA256

          0799c603b2f004099f344e2e6b51ef1f07585fbcc8d73771019341f97b150931

          SHA512

          e637c77b472b96b3de277a970189a60779e8c118c6641c455c254de04441d257fd0f14f40761aa6c3b1528c8385b6226e0b0e3cda56e6c6b2dfb137b9ace40bd

        • \Users\Admin\hvxoid.exe

          Filesize

          228KB

          MD5

          a11a47c8292c83e7d3287c623b1fb80b

          SHA1

          463f2b4e0d0cef34e30ae1e6c3d9144592ad564f

          SHA256

          0799c603b2f004099f344e2e6b51ef1f07585fbcc8d73771019341f97b150931

          SHA512

          e637c77b472b96b3de277a970189a60779e8c118c6641c455c254de04441d257fd0f14f40761aa6c3b1528c8385b6226e0b0e3cda56e6c6b2dfb137b9ace40bd

        • \Users\Admin\hvxoid.exe

          Filesize

          228KB

          MD5

          a11a47c8292c83e7d3287c623b1fb80b

          SHA1

          463f2b4e0d0cef34e30ae1e6c3d9144592ad564f

          SHA256

          0799c603b2f004099f344e2e6b51ef1f07585fbcc8d73771019341f97b150931

          SHA512

          e637c77b472b96b3de277a970189a60779e8c118c6641c455c254de04441d257fd0f14f40761aa6c3b1528c8385b6226e0b0e3cda56e6c6b2dfb137b9ace40bd

        • memory/1380-56-0x00000000757A1000-0x00000000757A3000-memory.dmp

          Filesize

          8KB