Analysis

  • max time kernel
    186s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 07:25

General

  • Target

    7c28b859d5d94573e40ca43cd2e09f8cbdbc7779362b7d4affabfec11bdb7040.exe

  • Size

    212KB

  • MD5

    41366928a4e85c596531fb47320ba766

  • SHA1

    0a11dbb6a0f046eeddd8baefae735d4eb1ca5d86

  • SHA256

    7c28b859d5d94573e40ca43cd2e09f8cbdbc7779362b7d4affabfec11bdb7040

  • SHA512

    2db0c8b8e24409e1cf2b03fcd5cd52c8cdb0bd5b16e985a81adb52eb9aff00cbc0d2e0cf31782dd7502cba09ab6f189eed536d6851685413758da33881f3001f

  • SSDEEP

    6144:6aAKwwPficzY09umHh7K5cUXEBwrYVHhAgY61cD:VAbyfxY09umH45cUXEBwUVHhAgY61U

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 58 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c28b859d5d94573e40ca43cd2e09f8cbdbc7779362b7d4affabfec11bdb7040.exe
    "C:\Users\Admin\AppData\Local\Temp\7c28b859d5d94573e40ca43cd2e09f8cbdbc7779362b7d4affabfec11bdb7040.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Users\Admin\suogod.exe
      "C:\Users\Admin\suogod.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\suogod.exe

    Filesize

    212KB

    MD5

    23e9ab4d5756e36f5c63d638c322c2f2

    SHA1

    d4eb2f9ca8edf4f02a75cd7ab3ae9bffc5eb670d

    SHA256

    fdf2c13c244a390f6fb961fbb791fe61bf8d79ff7f7be67ee14ff9585232bed8

    SHA512

    4fac2bb4c4638b1812f10309c17e97d448c79dee45ab6f9374e40ff4cee0ad58df693146ce7664327ddeb6cf683aec33e9137311e1c3e02fbd8f70d230fb36a0

  • C:\Users\Admin\suogod.exe

    Filesize

    212KB

    MD5

    23e9ab4d5756e36f5c63d638c322c2f2

    SHA1

    d4eb2f9ca8edf4f02a75cd7ab3ae9bffc5eb670d

    SHA256

    fdf2c13c244a390f6fb961fbb791fe61bf8d79ff7f7be67ee14ff9585232bed8

    SHA512

    4fac2bb4c4638b1812f10309c17e97d448c79dee45ab6f9374e40ff4cee0ad58df693146ce7664327ddeb6cf683aec33e9137311e1c3e02fbd8f70d230fb36a0

  • \Users\Admin\suogod.exe

    Filesize

    212KB

    MD5

    23e9ab4d5756e36f5c63d638c322c2f2

    SHA1

    d4eb2f9ca8edf4f02a75cd7ab3ae9bffc5eb670d

    SHA256

    fdf2c13c244a390f6fb961fbb791fe61bf8d79ff7f7be67ee14ff9585232bed8

    SHA512

    4fac2bb4c4638b1812f10309c17e97d448c79dee45ab6f9374e40ff4cee0ad58df693146ce7664327ddeb6cf683aec33e9137311e1c3e02fbd8f70d230fb36a0

  • \Users\Admin\suogod.exe

    Filesize

    212KB

    MD5

    23e9ab4d5756e36f5c63d638c322c2f2

    SHA1

    d4eb2f9ca8edf4f02a75cd7ab3ae9bffc5eb670d

    SHA256

    fdf2c13c244a390f6fb961fbb791fe61bf8d79ff7f7be67ee14ff9585232bed8

    SHA512

    4fac2bb4c4638b1812f10309c17e97d448c79dee45ab6f9374e40ff4cee0ad58df693146ce7664327ddeb6cf683aec33e9137311e1c3e02fbd8f70d230fb36a0

  • memory/968-56-0x0000000075771000-0x0000000075773000-memory.dmp

    Filesize

    8KB