Analysis

  • max time kernel
    237s
  • max time network
    213s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 19:22

General

  • Target

    88b706949ba5a180d20e8b4291bd2de98b87f62bfe8a74181ebe8f533dddd91e.exe

  • Size

    232KB

  • MD5

    0b567b9b3e501cc33378112d785d3f1b

  • SHA1

    512cf0c8a070d24f8c14f40f235b7b3c7b89be0c

  • SHA256

    88b706949ba5a180d20e8b4291bd2de98b87f62bfe8a74181ebe8f533dddd91e

  • SHA512

    51b8109fbb9ad6e71fea9621d64b858373d92f646e088700605b71fec6d8cefc90c34a68cb198e64284ee6c0517ce3793e0612289cccd6c9f06240da3303e88e

  • SSDEEP

    6144:y23PFKs78g2KyEOaWEqxF6snji81RUinKdNObY:/Ph+mF9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88b706949ba5a180d20e8b4291bd2de98b87f62bfe8a74181ebe8f533dddd91e.exe
    "C:\Users\Admin\AppData\Local\Temp\88b706949ba5a180d20e8b4291bd2de98b87f62bfe8a74181ebe8f533dddd91e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Users\Admin\reesia.exe
      "C:\Users\Admin\reesia.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\reesia.exe

    Filesize

    232KB

    MD5

    375a08baf6305972d8c4bf1d68eef653

    SHA1

    78d2436f9835ee8ff61fc5cb0a6c1acfdbb466b0

    SHA256

    853843a59b2e43bc6338ae1478b1b333fe78b1bff609fb276af1c866e19c8bdb

    SHA512

    aff63993ba5c93fa405b33e5e3b85a953d2198937f60a6789b22786eb94e9c4c5a812ace3eeec4c683790652f5595a199e408b4da4f13ebb27e86cea237f2da5

  • C:\Users\Admin\reesia.exe

    Filesize

    232KB

    MD5

    375a08baf6305972d8c4bf1d68eef653

    SHA1

    78d2436f9835ee8ff61fc5cb0a6c1acfdbb466b0

    SHA256

    853843a59b2e43bc6338ae1478b1b333fe78b1bff609fb276af1c866e19c8bdb

    SHA512

    aff63993ba5c93fa405b33e5e3b85a953d2198937f60a6789b22786eb94e9c4c5a812ace3eeec4c683790652f5595a199e408b4da4f13ebb27e86cea237f2da5

  • \Users\Admin\reesia.exe

    Filesize

    232KB

    MD5

    375a08baf6305972d8c4bf1d68eef653

    SHA1

    78d2436f9835ee8ff61fc5cb0a6c1acfdbb466b0

    SHA256

    853843a59b2e43bc6338ae1478b1b333fe78b1bff609fb276af1c866e19c8bdb

    SHA512

    aff63993ba5c93fa405b33e5e3b85a953d2198937f60a6789b22786eb94e9c4c5a812ace3eeec4c683790652f5595a199e408b4da4f13ebb27e86cea237f2da5

  • \Users\Admin\reesia.exe

    Filesize

    232KB

    MD5

    375a08baf6305972d8c4bf1d68eef653

    SHA1

    78d2436f9835ee8ff61fc5cb0a6c1acfdbb466b0

    SHA256

    853843a59b2e43bc6338ae1478b1b333fe78b1bff609fb276af1c866e19c8bdb

    SHA512

    aff63993ba5c93fa405b33e5e3b85a953d2198937f60a6789b22786eb94e9c4c5a812ace3eeec4c683790652f5595a199e408b4da4f13ebb27e86cea237f2da5

  • memory/1160-59-0x0000000000000000-mapping.dmp

  • memory/1164-56-0x0000000075151000-0x0000000075153000-memory.dmp

    Filesize

    8KB