Analysis

  • max time kernel
    261s
  • max time network
    335s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 07:27

General

  • Target

    78e6fd4cb4e3c394486b383721115cb65368e6e4065a3e503a0e447c8b63b0b5.exe

  • Size

    124KB

  • MD5

    13189e912bba47fec4a40b018ceae910

  • SHA1

    aea5250c4bbd600ce0842c41fe538b20b376b1b9

  • SHA256

    78e6fd4cb4e3c394486b383721115cb65368e6e4065a3e503a0e447c8b63b0b5

  • SHA512

    55dbdb463643dcf496fc16f0c80e88b6c8a2d6227db32c6c56aeb63987247fdddd18144590840adfcac9889f2a6b8d8d34a3610c6c22cf80f2478d1be8e37229

  • SSDEEP

    1536:XrbjEFQ/67NxkiQixA+alh98r8Y9USv1jyPwo7JaS1:bbjEFQ/67gjH8ri8iwQL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78e6fd4cb4e3c394486b383721115cb65368e6e4065a3e503a0e447c8b63b0b5.exe
    "C:\Users\Admin\AppData\Local\Temp\78e6fd4cb4e3c394486b383721115cb65368e6e4065a3e503a0e447c8b63b0b5.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\cueza.exe
      "C:\Users\Admin\cueza.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1684

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\cueza.exe

          Filesize

          124KB

          MD5

          10b62947eb369186b333e03aa2cf19dc

          SHA1

          3d4933e5557138fba290133600ae8d7d4c6ec3cc

          SHA256

          c6f799a58248b73dedd09420cdc47365f797ecaefbebce25cd617abdd8ffe60f

          SHA512

          62ab8cf515a6ef7d08a560718c1094f0d307f615b4a8fb359f827b407b10654131395c1ac966ea906651d7743a545bfd052a9993dbc930f52223991434a3e802

        • C:\Users\Admin\cueza.exe

          Filesize

          124KB

          MD5

          10b62947eb369186b333e03aa2cf19dc

          SHA1

          3d4933e5557138fba290133600ae8d7d4c6ec3cc

          SHA256

          c6f799a58248b73dedd09420cdc47365f797ecaefbebce25cd617abdd8ffe60f

          SHA512

          62ab8cf515a6ef7d08a560718c1094f0d307f615b4a8fb359f827b407b10654131395c1ac966ea906651d7743a545bfd052a9993dbc930f52223991434a3e802

        • \Users\Admin\cueza.exe

          Filesize

          124KB

          MD5

          10b62947eb369186b333e03aa2cf19dc

          SHA1

          3d4933e5557138fba290133600ae8d7d4c6ec3cc

          SHA256

          c6f799a58248b73dedd09420cdc47365f797ecaefbebce25cd617abdd8ffe60f

          SHA512

          62ab8cf515a6ef7d08a560718c1094f0d307f615b4a8fb359f827b407b10654131395c1ac966ea906651d7743a545bfd052a9993dbc930f52223991434a3e802

        • \Users\Admin\cueza.exe

          Filesize

          124KB

          MD5

          10b62947eb369186b333e03aa2cf19dc

          SHA1

          3d4933e5557138fba290133600ae8d7d4c6ec3cc

          SHA256

          c6f799a58248b73dedd09420cdc47365f797ecaefbebce25cd617abdd8ffe60f

          SHA512

          62ab8cf515a6ef7d08a560718c1094f0d307f615b4a8fb359f827b407b10654131395c1ac966ea906651d7743a545bfd052a9993dbc930f52223991434a3e802

        • memory/1324-56-0x00000000757C1000-0x00000000757C3000-memory.dmp

          Filesize

          8KB