Analysis

  • max time kernel
    151s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 19:10

General

  • Target

    c50611155e452b04251d87ff87163176463a74c0eba10b12406abbc4ceb56e8b.exe

  • Size

    228KB

  • MD5

    85f92d12a7c38438e96d577fc5e1ec15

  • SHA1

    3b3a596e90449e332495d831f9339f5de572f5df

  • SHA256

    c50611155e452b04251d87ff87163176463a74c0eba10b12406abbc4ceb56e8b

  • SHA512

    016c502fd3b88b04371ffd6fb84bf0d7bc0596e732a2d817d8a2297643b8a9499679f4524e3336107bd3c8c77bac5ba0429b60621aebdd902ce3eb4854660090

  • SSDEEP

    6144:0kKqhXbU7akpWm0/mnn7ruTbio1We0xOodpBN1:m+LQpWm0/mnn7ruTbio1We0xOodpP1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c50611155e452b04251d87ff87163176463a74c0eba10b12406abbc4ceb56e8b.exe
    "C:\Users\Admin\AppData\Local\Temp\c50611155e452b04251d87ff87163176463a74c0eba10b12406abbc4ceb56e8b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\qlsad.exe
      "C:\Users\Admin\qlsad.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1944

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qlsad.exe

          Filesize

          228KB

          MD5

          ce0c988d3930dd7260777f4719a371ee

          SHA1

          30aa7a9e07695663ea058180e5cc519fd9aa9dfc

          SHA256

          76a05febfe5722c634e47af9cb9c6c524928c6d55298a8742d67a75bad74c720

          SHA512

          14801872caeb4448feb271fa3a9ec1ab66138289afb1b93b8328f4bafe6edd307049e8bdb9cb492d83c16f30be4f18022e0c3e13ea10d5c88075e966b3c14683

        • C:\Users\Admin\qlsad.exe

          Filesize

          228KB

          MD5

          ce0c988d3930dd7260777f4719a371ee

          SHA1

          30aa7a9e07695663ea058180e5cc519fd9aa9dfc

          SHA256

          76a05febfe5722c634e47af9cb9c6c524928c6d55298a8742d67a75bad74c720

          SHA512

          14801872caeb4448feb271fa3a9ec1ab66138289afb1b93b8328f4bafe6edd307049e8bdb9cb492d83c16f30be4f18022e0c3e13ea10d5c88075e966b3c14683

        • \Users\Admin\qlsad.exe

          Filesize

          228KB

          MD5

          ce0c988d3930dd7260777f4719a371ee

          SHA1

          30aa7a9e07695663ea058180e5cc519fd9aa9dfc

          SHA256

          76a05febfe5722c634e47af9cb9c6c524928c6d55298a8742d67a75bad74c720

          SHA512

          14801872caeb4448feb271fa3a9ec1ab66138289afb1b93b8328f4bafe6edd307049e8bdb9cb492d83c16f30be4f18022e0c3e13ea10d5c88075e966b3c14683

        • \Users\Admin\qlsad.exe

          Filesize

          228KB

          MD5

          ce0c988d3930dd7260777f4719a371ee

          SHA1

          30aa7a9e07695663ea058180e5cc519fd9aa9dfc

          SHA256

          76a05febfe5722c634e47af9cb9c6c524928c6d55298a8742d67a75bad74c720

          SHA512

          14801872caeb4448feb271fa3a9ec1ab66138289afb1b93b8328f4bafe6edd307049e8bdb9cb492d83c16f30be4f18022e0c3e13ea10d5c88075e966b3c14683

        • memory/1148-56-0x0000000074C91000-0x0000000074C93000-memory.dmp

          Filesize

          8KB