Analysis

  • max time kernel
    173s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 19:18

General

  • Target

    9e3653e8ab434fc0b39b792816e7ffbf82217b59a7b7cc6e73c3e06091fa18de.exe

  • Size

    212KB

  • MD5

    09897e4883bdccd19732399345f84d68

  • SHA1

    4619fd2eb88db09298d3fe5f7ca0db1a0d406603

  • SHA256

    9e3653e8ab434fc0b39b792816e7ffbf82217b59a7b7cc6e73c3e06091fa18de

  • SHA512

    771b6958364305aeb10235782de7b1a989f47a7edf351f8409f0248450551408cc158dba7a7a939d548a23569523873d6ff1d7f5760e98f47e0246bc090b0477

  • SSDEEP

    6144:0CKoFwzWQPO8J0bqihew3b7KvfCBnn78MDxG6oRKnvmb7/D26NhHmpfXJNRSf:rKoFw+8J0egew3bevfY78MDxG6oRKnvA

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e3653e8ab434fc0b39b792816e7ffbf82217b59a7b7cc6e73c3e06091fa18de.exe
    "C:\Users\Admin\AppData\Local\Temp\9e3653e8ab434fc0b39b792816e7ffbf82217b59a7b7cc6e73c3e06091fa18de.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Users\Admin\sxgouq.exe
      "C:\Users\Admin\sxgouq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\sxgouq.exe

    Filesize

    212KB

    MD5

    517dfc1089a1f9dd60ceb9c626dcde45

    SHA1

    7bce799f84bb29f574cb991f0e2d6ab9d2a471be

    SHA256

    e800dfaebd6707310ef5b4fc13c7f0e3ec104a7bf16468773677d153cca1cf2e

    SHA512

    3c06cbf7e7337f4e5759ce39fef97ebbcd58d58670c829392aa0e8c30e8376752e27d5f736292e95e86e929340464f0c4e86e8889e42e661c4427c6b45d9bacc

  • C:\Users\Admin\sxgouq.exe

    Filesize

    212KB

    MD5

    517dfc1089a1f9dd60ceb9c626dcde45

    SHA1

    7bce799f84bb29f574cb991f0e2d6ab9d2a471be

    SHA256

    e800dfaebd6707310ef5b4fc13c7f0e3ec104a7bf16468773677d153cca1cf2e

    SHA512

    3c06cbf7e7337f4e5759ce39fef97ebbcd58d58670c829392aa0e8c30e8376752e27d5f736292e95e86e929340464f0c4e86e8889e42e661c4427c6b45d9bacc

  • \Users\Admin\sxgouq.exe

    Filesize

    212KB

    MD5

    517dfc1089a1f9dd60ceb9c626dcde45

    SHA1

    7bce799f84bb29f574cb991f0e2d6ab9d2a471be

    SHA256

    e800dfaebd6707310ef5b4fc13c7f0e3ec104a7bf16468773677d153cca1cf2e

    SHA512

    3c06cbf7e7337f4e5759ce39fef97ebbcd58d58670c829392aa0e8c30e8376752e27d5f736292e95e86e929340464f0c4e86e8889e42e661c4427c6b45d9bacc

  • \Users\Admin\sxgouq.exe

    Filesize

    212KB

    MD5

    517dfc1089a1f9dd60ceb9c626dcde45

    SHA1

    7bce799f84bb29f574cb991f0e2d6ab9d2a471be

    SHA256

    e800dfaebd6707310ef5b4fc13c7f0e3ec104a7bf16468773677d153cca1cf2e

    SHA512

    3c06cbf7e7337f4e5759ce39fef97ebbcd58d58670c829392aa0e8c30e8376752e27d5f736292e95e86e929340464f0c4e86e8889e42e661c4427c6b45d9bacc

  • memory/772-56-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB