Analysis

  • max time kernel
    154s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 17:23

General

  • Target

    951f17b9ba9aceba39d4626476e6f0d0f004600f738be2e85cbec6ec8e1ff152.exe

  • Size

    256KB

  • MD5

    cfef94cc97a5ab4b332b46833bbf471f

  • SHA1

    0df92a3001d0cea3ff0e6c56faea2c7ebfd2b4f0

  • SHA256

    951f17b9ba9aceba39d4626476e6f0d0f004600f738be2e85cbec6ec8e1ff152

  • SHA512

    94c30e2d27dcad262595150fff463edffad998d70f64ca3527c259e5c164e99fdd573a61c38733e65df0081a07f9804f71d84f381e109cf5f399b18d8f87ee0a

  • SSDEEP

    6144:ev7qvoNymi+7eeyz2P9NnnnFCpImnTZygoHlKnvmb7/D26UBnmbLBXSG:euvoNymi+7eOP9anTZygoHlKnvmb7/Dr

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\951f17b9ba9aceba39d4626476e6f0d0f004600f738be2e85cbec6ec8e1ff152.exe
    "C:\Users\Admin\AppData\Local\Temp\951f17b9ba9aceba39d4626476e6f0d0f004600f738be2e85cbec6ec8e1ff152.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\gaeatu.exe
      "C:\Users\Admin\gaeatu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gaeatu.exe

    Filesize

    256KB

    MD5

    8e692eb0724acb1613c85629f2016037

    SHA1

    ab3b250427fe24a6392419e22520c944240d1630

    SHA256

    82fffc6678af5bb2673e9ccabc70ac4d0fefbd75df46818f258de08a26e719b3

    SHA512

    3ad47488684fc634fb967da0d0cddf92e68471ab8f714e9383f24099696c9113cc3cdbcf9934aecb6f7416b3cb721abb48d8d3f4e34299669d8f3272f8b9c073

  • C:\Users\Admin\gaeatu.exe

    Filesize

    256KB

    MD5

    8e692eb0724acb1613c85629f2016037

    SHA1

    ab3b250427fe24a6392419e22520c944240d1630

    SHA256

    82fffc6678af5bb2673e9ccabc70ac4d0fefbd75df46818f258de08a26e719b3

    SHA512

    3ad47488684fc634fb967da0d0cddf92e68471ab8f714e9383f24099696c9113cc3cdbcf9934aecb6f7416b3cb721abb48d8d3f4e34299669d8f3272f8b9c073

  • \Users\Admin\gaeatu.exe

    Filesize

    256KB

    MD5

    8e692eb0724acb1613c85629f2016037

    SHA1

    ab3b250427fe24a6392419e22520c944240d1630

    SHA256

    82fffc6678af5bb2673e9ccabc70ac4d0fefbd75df46818f258de08a26e719b3

    SHA512

    3ad47488684fc634fb967da0d0cddf92e68471ab8f714e9383f24099696c9113cc3cdbcf9934aecb6f7416b3cb721abb48d8d3f4e34299669d8f3272f8b9c073

  • \Users\Admin\gaeatu.exe

    Filesize

    256KB

    MD5

    8e692eb0724acb1613c85629f2016037

    SHA1

    ab3b250427fe24a6392419e22520c944240d1630

    SHA256

    82fffc6678af5bb2673e9ccabc70ac4d0fefbd75df46818f258de08a26e719b3

    SHA512

    3ad47488684fc634fb967da0d0cddf92e68471ab8f714e9383f24099696c9113cc3cdbcf9934aecb6f7416b3cb721abb48d8d3f4e34299669d8f3272f8b9c073

  • memory/972-56-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB