Analysis

  • max time kernel
    150s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 11:36

General

  • Target

    eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe

  • Size

    304KB

  • MD5

    1bddeda269cb7cb5b41b6e497757ded0

  • SHA1

    12841ce1bcaadb6a7786a07ee54ba9c328512d9f

  • SHA256

    eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e

  • SHA512

    5b1718b0e93edad8c7ee201b53331dc75819bf24f7982c935d3aa17923338dee29e13a51b49fd15f5d57b1af5ad52245a303b2514382126488434846a4ca6742

  • SSDEEP

    3072:GPGOaEaAaTG0kZSmA2Spxqc+2IMop2aEaLFra+7pvPSvzhy:b4ApDJIylaRSg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe
    "C:\Users\Admin\AppData\Local\Temp\eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\tueed.exe
      "C:\Users\Admin\tueed.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1232

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tueed.exe

    Filesize

    304KB

    MD5

    a2bf2242ab46e58b0e85efd37a732ab6

    SHA1

    f3f548634866c7ebc356b644336a9e4018e7a84e

    SHA256

    be0a58b089f55f13ad631fc42be1fd364c8998dc39f5d08a0a45bd9155efc313

    SHA512

    d768d26ecec66c2b6bc0df6d0d4e1fb2d88b076519e74f12360fe7d7b637bd6f94f77523cc1a6695f3e7c482e7c51188ebae2fbf5d5e54987c50ba0f562ba90f

  • C:\Users\Admin\tueed.exe

    Filesize

    304KB

    MD5

    a2bf2242ab46e58b0e85efd37a732ab6

    SHA1

    f3f548634866c7ebc356b644336a9e4018e7a84e

    SHA256

    be0a58b089f55f13ad631fc42be1fd364c8998dc39f5d08a0a45bd9155efc313

    SHA512

    d768d26ecec66c2b6bc0df6d0d4e1fb2d88b076519e74f12360fe7d7b637bd6f94f77523cc1a6695f3e7c482e7c51188ebae2fbf5d5e54987c50ba0f562ba90f

  • \Users\Admin\tueed.exe

    Filesize

    304KB

    MD5

    a2bf2242ab46e58b0e85efd37a732ab6

    SHA1

    f3f548634866c7ebc356b644336a9e4018e7a84e

    SHA256

    be0a58b089f55f13ad631fc42be1fd364c8998dc39f5d08a0a45bd9155efc313

    SHA512

    d768d26ecec66c2b6bc0df6d0d4e1fb2d88b076519e74f12360fe7d7b637bd6f94f77523cc1a6695f3e7c482e7c51188ebae2fbf5d5e54987c50ba0f562ba90f

  • \Users\Admin\tueed.exe

    Filesize

    304KB

    MD5

    a2bf2242ab46e58b0e85efd37a732ab6

    SHA1

    f3f548634866c7ebc356b644336a9e4018e7a84e

    SHA256

    be0a58b089f55f13ad631fc42be1fd364c8998dc39f5d08a0a45bd9155efc313

    SHA512

    d768d26ecec66c2b6bc0df6d0d4e1fb2d88b076519e74f12360fe7d7b637bd6f94f77523cc1a6695f3e7c482e7c51188ebae2fbf5d5e54987c50ba0f562ba90f

  • memory/1968-56-0x00000000756B1000-0x00000000756B3000-memory.dmp

    Filesize

    8KB