Analysis

  • max time kernel
    153s
  • max time network
    201s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 20:21

General

  • Target

    9f415a4ea18f2edad7c14c85ad20844c2281745d351d53606e6be713e494edaf.exe

  • Size

    264KB

  • MD5

    08b853160667ce3bf4ab021586e13590

  • SHA1

    949b98d8e7755aaf3fea2e9c4cba686f9d9b75c7

  • SHA256

    9f415a4ea18f2edad7c14c85ad20844c2281745d351d53606e6be713e494edaf

  • SHA512

    99662091ab48c6200d7e945ffe7cc137b4faa0ca075a75149e1213aed94873a6695bc50b3c14fa309ed9f97434aed99dd62b9821ee49ebe3d8b419834f23e881

  • SSDEEP

    6144:/FZ8gY0OqFNLVJ6S0lE+6LVjlWPuEwTIwMe/wwU3ch:/zHhNLVJ/nLVjlWPuEwam

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 58 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f415a4ea18f2edad7c14c85ad20844c2281745d351d53606e6be713e494edaf.exe
    "C:\Users\Admin\AppData\Local\Temp\9f415a4ea18f2edad7c14c85ad20844c2281745d351d53606e6be713e494edaf.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\saecuo.exe
      "C:\Users\Admin\saecuo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\saecuo.exe

    Filesize

    264KB

    MD5

    39fd025566c7d702923d8dd7017a42f2

    SHA1

    8e197231b7813753d4f884c5f8284263a836dc23

    SHA256

    b5719eace8ba0ad79b4637710e2edd91afd7984c3c0144141782bf6397779c5c

    SHA512

    cb4dfdc3186c11f32bb77f4d822d1e63eff504c88eccfbc47d5af5859738c4fbe9291c20cf70564399d7a9edc3a8ad34e1e35c36c548b97ce8aac47aca1bffa1

  • C:\Users\Admin\saecuo.exe

    Filesize

    264KB

    MD5

    39fd025566c7d702923d8dd7017a42f2

    SHA1

    8e197231b7813753d4f884c5f8284263a836dc23

    SHA256

    b5719eace8ba0ad79b4637710e2edd91afd7984c3c0144141782bf6397779c5c

    SHA512

    cb4dfdc3186c11f32bb77f4d822d1e63eff504c88eccfbc47d5af5859738c4fbe9291c20cf70564399d7a9edc3a8ad34e1e35c36c548b97ce8aac47aca1bffa1

  • \Users\Admin\saecuo.exe

    Filesize

    264KB

    MD5

    39fd025566c7d702923d8dd7017a42f2

    SHA1

    8e197231b7813753d4f884c5f8284263a836dc23

    SHA256

    b5719eace8ba0ad79b4637710e2edd91afd7984c3c0144141782bf6397779c5c

    SHA512

    cb4dfdc3186c11f32bb77f4d822d1e63eff504c88eccfbc47d5af5859738c4fbe9291c20cf70564399d7a9edc3a8ad34e1e35c36c548b97ce8aac47aca1bffa1

  • \Users\Admin\saecuo.exe

    Filesize

    264KB

    MD5

    39fd025566c7d702923d8dd7017a42f2

    SHA1

    8e197231b7813753d4f884c5f8284263a836dc23

    SHA256

    b5719eace8ba0ad79b4637710e2edd91afd7984c3c0144141782bf6397779c5c

    SHA512

    cb4dfdc3186c11f32bb77f4d822d1e63eff504c88eccfbc47d5af5859738c4fbe9291c20cf70564399d7a9edc3a8ad34e1e35c36c548b97ce8aac47aca1bffa1

  • memory/1888-56-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB