Analysis

  • max time kernel
    26s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 19:39

General

  • Target

    ab9119d97b68ed438349e88416d08ad335b5729de5dbd3c200a70fc176f22c73.exe

  • Size

    68KB

  • MD5

    6c98703960644f5c7748f960f34bde60

  • SHA1

    11d18c4aae04940527c72e513ddf93f81ae6860b

  • SHA256

    ab9119d97b68ed438349e88416d08ad335b5729de5dbd3c200a70fc176f22c73

  • SHA512

    301db7f2bab3132c76e8816e2c2caeb29a9f77a945ddeb25d5a903e757329eb51cb515f083ea313fbecc3f8c1225178c43506c9a6675aa24419187f72ad6cd01

  • SSDEEP

    768:6vtqK0iVsLL53OgYCJO9FwKtJoTQrQD7/BCES89sFs6MyS1:6k5kgYCYjtC+89sFslr1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab9119d97b68ed438349e88416d08ad335b5729de5dbd3c200a70fc176f22c73.exe
    "C:\Users\Admin\AppData\Local\Temp\ab9119d97b68ed438349e88416d08ad335b5729de5dbd3c200a70fc176f22c73.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\dualaa.exe
      "C:\Users\Admin\dualaa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\dualaa.exe

    Filesize

    68KB

    MD5

    57fdad2a3189bda2c799b3cade0df4d5

    SHA1

    b2c154127735fbc4e15d9459ecd74692d1e1a12b

    SHA256

    3136f7f27b87b5c5124997ba7091905d8f4913a5c93462a1cbf35ebbbfaa51a3

    SHA512

    fda656f535ba4dde6c3a7def04edafb120730d87f9bbb877d04ffde27d50ad1d4cbfddfdb7887e62e1e3a836facce2dbaa71761a500f196736d569c5ad10b225

  • C:\Users\Admin\dualaa.exe

    Filesize

    68KB

    MD5

    57fdad2a3189bda2c799b3cade0df4d5

    SHA1

    b2c154127735fbc4e15d9459ecd74692d1e1a12b

    SHA256

    3136f7f27b87b5c5124997ba7091905d8f4913a5c93462a1cbf35ebbbfaa51a3

    SHA512

    fda656f535ba4dde6c3a7def04edafb120730d87f9bbb877d04ffde27d50ad1d4cbfddfdb7887e62e1e3a836facce2dbaa71761a500f196736d569c5ad10b225

  • \Users\Admin\dualaa.exe

    Filesize

    68KB

    MD5

    57fdad2a3189bda2c799b3cade0df4d5

    SHA1

    b2c154127735fbc4e15d9459ecd74692d1e1a12b

    SHA256

    3136f7f27b87b5c5124997ba7091905d8f4913a5c93462a1cbf35ebbbfaa51a3

    SHA512

    fda656f535ba4dde6c3a7def04edafb120730d87f9bbb877d04ffde27d50ad1d4cbfddfdb7887e62e1e3a836facce2dbaa71761a500f196736d569c5ad10b225

  • \Users\Admin\dualaa.exe

    Filesize

    68KB

    MD5

    57fdad2a3189bda2c799b3cade0df4d5

    SHA1

    b2c154127735fbc4e15d9459ecd74692d1e1a12b

    SHA256

    3136f7f27b87b5c5124997ba7091905d8f4913a5c93462a1cbf35ebbbfaa51a3

    SHA512

    fda656f535ba4dde6c3a7def04edafb120730d87f9bbb877d04ffde27d50ad1d4cbfddfdb7887e62e1e3a836facce2dbaa71761a500f196736d569c5ad10b225

  • memory/1724-56-0x0000000074B51000-0x0000000074B53000-memory.dmp

    Filesize

    8KB