Analysis

  • max time kernel
    150s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 20:02

General

  • Target

    5070c6273304f6bc2a49bd0e77d79c6e018a70aeb015c13d774fb2a9eecc23ff.exe

  • Size

    228KB

  • MD5

    369f66149f3566d1dbe659e35f8cb2a0

  • SHA1

    eeb3a9077e60947d2569d098c72a3afcc87b1250

  • SHA256

    5070c6273304f6bc2a49bd0e77d79c6e018a70aeb015c13d774fb2a9eecc23ff

  • SHA512

    9514523a3f3d371001da7fb865007fa1029f2288c7ab2cba5d3514555cf98e313758e1984be8fa94e42dab08c61267c235193dcdd993438eb70ddacf21c0be6e

  • SSDEEP

    3072:E3DIpK9xKA9w2p4QZisLaazNiIIkyyqY4oQZiE0BUj:E38pKxY+1isuazgfkl/WH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5070c6273304f6bc2a49bd0e77d79c6e018a70aeb015c13d774fb2a9eecc23ff.exe
    "C:\Users\Admin\AppData\Local\Temp\5070c6273304f6bc2a49bd0e77d79c6e018a70aeb015c13d774fb2a9eecc23ff.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\xogak.exe
      "C:\Users\Admin\xogak.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:984

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\xogak.exe

          Filesize

          228KB

          MD5

          d15253e1fd9fa94ec6e6c2d31554632a

          SHA1

          592688d8f45f42edd069a035ec1f6e5262a40d9b

          SHA256

          7845e445730fcfad4dbaef168171437f796fc49c0c19c6f2e194500d34128e5d

          SHA512

          5baafb057053d7f6cac022271170e6b8e6b741928a391be0d6b5bb33ce5e114b681c2d5d802ce48911e2025eb423473489335d0197a7c6e569e0d35991bace9d

        • C:\Users\Admin\xogak.exe

          Filesize

          228KB

          MD5

          d15253e1fd9fa94ec6e6c2d31554632a

          SHA1

          592688d8f45f42edd069a035ec1f6e5262a40d9b

          SHA256

          7845e445730fcfad4dbaef168171437f796fc49c0c19c6f2e194500d34128e5d

          SHA512

          5baafb057053d7f6cac022271170e6b8e6b741928a391be0d6b5bb33ce5e114b681c2d5d802ce48911e2025eb423473489335d0197a7c6e569e0d35991bace9d

        • \Users\Admin\xogak.exe

          Filesize

          228KB

          MD5

          d15253e1fd9fa94ec6e6c2d31554632a

          SHA1

          592688d8f45f42edd069a035ec1f6e5262a40d9b

          SHA256

          7845e445730fcfad4dbaef168171437f796fc49c0c19c6f2e194500d34128e5d

          SHA512

          5baafb057053d7f6cac022271170e6b8e6b741928a391be0d6b5bb33ce5e114b681c2d5d802ce48911e2025eb423473489335d0197a7c6e569e0d35991bace9d

        • \Users\Admin\xogak.exe

          Filesize

          228KB

          MD5

          d15253e1fd9fa94ec6e6c2d31554632a

          SHA1

          592688d8f45f42edd069a035ec1f6e5262a40d9b

          SHA256

          7845e445730fcfad4dbaef168171437f796fc49c0c19c6f2e194500d34128e5d

          SHA512

          5baafb057053d7f6cac022271170e6b8e6b741928a391be0d6b5bb33ce5e114b681c2d5d802ce48911e2025eb423473489335d0197a7c6e569e0d35991bace9d

        • memory/984-66-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/984-69-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/1672-56-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/1672-57-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

          Filesize

          8KB

        • memory/1672-65-0x00000000030E0000-0x0000000003119000-memory.dmp

          Filesize

          228KB

        • memory/1672-68-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB