Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 22:07

General

  • Target

    e38657e1bfe08491ddf5acdb9d3bc4e8e4f4f5d724b471ba2794f6425b8c2ec9.exe

  • Size

    240KB

  • MD5

    b6921d88d598f9b85549858e4a867ef9

  • SHA1

    64d1c68278671301654dbd4825382093736cb666

  • SHA256

    e38657e1bfe08491ddf5acdb9d3bc4e8e4f4f5d724b471ba2794f6425b8c2ec9

  • SHA512

    2185c32cbbc1d3ece6ac4129012595f44fc89464f4e7f5327db2f7d7ab6edeb719d418a23ed7c20a5ac35a42585930f2c2e48cdbda593a638178136e4f027401

  • SSDEEP

    3072:DPzEAPZBtw7SJjBrz/Q5w+tPgZMXC6FylcwBImXRgXfwo:7zzi7SJFzQ53uZOC6Fy+O4

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e38657e1bfe08491ddf5acdb9d3bc4e8e4f4f5d724b471ba2794f6425b8c2ec9.exe
    "C:\Users\Admin\AppData\Local\Temp\e38657e1bfe08491ddf5acdb9d3bc4e8e4f4f5d724b471ba2794f6425b8c2ec9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\muiato.exe
      "C:\Users\Admin\muiato.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\muiato.exe

    Filesize

    240KB

    MD5

    b6921d88d598f9b85549858e4a867ef9

    SHA1

    64d1c68278671301654dbd4825382093736cb666

    SHA256

    e38657e1bfe08491ddf5acdb9d3bc4e8e4f4f5d724b471ba2794f6425b8c2ec9

    SHA512

    2185c32cbbc1d3ece6ac4129012595f44fc89464f4e7f5327db2f7d7ab6edeb719d418a23ed7c20a5ac35a42585930f2c2e48cdbda593a638178136e4f027401

  • C:\Users\Admin\muiato.exe

    Filesize

    240KB

    MD5

    b6921d88d598f9b85549858e4a867ef9

    SHA1

    64d1c68278671301654dbd4825382093736cb666

    SHA256

    e38657e1bfe08491ddf5acdb9d3bc4e8e4f4f5d724b471ba2794f6425b8c2ec9

    SHA512

    2185c32cbbc1d3ece6ac4129012595f44fc89464f4e7f5327db2f7d7ab6edeb719d418a23ed7c20a5ac35a42585930f2c2e48cdbda593a638178136e4f027401

  • \Users\Admin\muiato.exe

    Filesize

    240KB

    MD5

    b6921d88d598f9b85549858e4a867ef9

    SHA1

    64d1c68278671301654dbd4825382093736cb666

    SHA256

    e38657e1bfe08491ddf5acdb9d3bc4e8e4f4f5d724b471ba2794f6425b8c2ec9

    SHA512

    2185c32cbbc1d3ece6ac4129012595f44fc89464f4e7f5327db2f7d7ab6edeb719d418a23ed7c20a5ac35a42585930f2c2e48cdbda593a638178136e4f027401

  • \Users\Admin\muiato.exe

    Filesize

    240KB

    MD5

    b6921d88d598f9b85549858e4a867ef9

    SHA1

    64d1c68278671301654dbd4825382093736cb666

    SHA256

    e38657e1bfe08491ddf5acdb9d3bc4e8e4f4f5d724b471ba2794f6425b8c2ec9

    SHA512

    2185c32cbbc1d3ece6ac4129012595f44fc89464f4e7f5327db2f7d7ab6edeb719d418a23ed7c20a5ac35a42585930f2c2e48cdbda593a638178136e4f027401

  • memory/1516-56-0x0000000075841000-0x0000000075843000-memory.dmp

    Filesize

    8KB

  • memory/1516-63-0x0000000074171000-0x0000000074173000-memory.dmp

    Filesize

    8KB

  • memory/1516-66-0x0000000074141000-0x0000000074143000-memory.dmp

    Filesize

    8KB