Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 21:26

General

  • Target

    c00d63bc9ebc45958892079f6495f92cc02443ad0ad35886ef3da2117b65bc9a.exe

  • Size

    100KB

  • MD5

    37197d810c92e0298b52af6a50d675bc

  • SHA1

    34f00e01f44616835341c18a1b52882d3a5f89e7

  • SHA256

    c00d63bc9ebc45958892079f6495f92cc02443ad0ad35886ef3da2117b65bc9a

  • SHA512

    fb8f7905782a1f3f407d087dd1ad4110ded0b436e05d7c45c8207d006a9855cf28c1c37d748e91ac9ccdf9e80d44ff72e53708b3ec69c4ef8a747d42483af317

  • SSDEEP

    1536:IrtG7H82NTzwGFMGAc4ohrPXo+73Rez8b0SyKNIjnZrJ:twFurPX7CKCnlJ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c00d63bc9ebc45958892079f6495f92cc02443ad0ad35886ef3da2117b65bc9a.exe
    "C:\Users\Admin\AppData\Local\Temp\c00d63bc9ebc45958892079f6495f92cc02443ad0ad35886ef3da2117b65bc9a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\daoxit.exe
      "C:\Users\Admin\daoxit.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\daoxit.exe

    Filesize

    100KB

    MD5

    d59f6581909dd6d508ebe5819d021010

    SHA1

    a418b64700219efa0f9a6b1176857f79390ddc7a

    SHA256

    37fab701dcdf30159f2fb94050e22b9e5703c96d3d3a1ca946444ff1d51d9737

    SHA512

    ef779cab1130b774edfab47c8b812e8bc202281e2515b5e995a53fcafcf24b8ad72d9e0d91d2d8de7fae21947829a51e8167f5a388982dd4ce45e7ef9c2917b6

  • C:\Users\Admin\daoxit.exe

    Filesize

    100KB

    MD5

    d59f6581909dd6d508ebe5819d021010

    SHA1

    a418b64700219efa0f9a6b1176857f79390ddc7a

    SHA256

    37fab701dcdf30159f2fb94050e22b9e5703c96d3d3a1ca946444ff1d51d9737

    SHA512

    ef779cab1130b774edfab47c8b812e8bc202281e2515b5e995a53fcafcf24b8ad72d9e0d91d2d8de7fae21947829a51e8167f5a388982dd4ce45e7ef9c2917b6

  • \Users\Admin\daoxit.exe

    Filesize

    100KB

    MD5

    d59f6581909dd6d508ebe5819d021010

    SHA1

    a418b64700219efa0f9a6b1176857f79390ddc7a

    SHA256

    37fab701dcdf30159f2fb94050e22b9e5703c96d3d3a1ca946444ff1d51d9737

    SHA512

    ef779cab1130b774edfab47c8b812e8bc202281e2515b5e995a53fcafcf24b8ad72d9e0d91d2d8de7fae21947829a51e8167f5a388982dd4ce45e7ef9c2917b6

  • \Users\Admin\daoxit.exe

    Filesize

    100KB

    MD5

    d59f6581909dd6d508ebe5819d021010

    SHA1

    a418b64700219efa0f9a6b1176857f79390ddc7a

    SHA256

    37fab701dcdf30159f2fb94050e22b9e5703c96d3d3a1ca946444ff1d51d9737

    SHA512

    ef779cab1130b774edfab47c8b812e8bc202281e2515b5e995a53fcafcf24b8ad72d9e0d91d2d8de7fae21947829a51e8167f5a388982dd4ce45e7ef9c2917b6

  • memory/1048-56-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB