Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 22:05

General

  • Target

    d00b454a2a5992c5e7e56cd81d11a0b8332963845423675d26216e142a7dd1e8.exe

  • Size

    180KB

  • MD5

    c91bc5c6fc0858edaee653ecabc608ed

  • SHA1

    56bc9cf74143be1527085e4a84ab9f4647bf3ccd

  • SHA256

    d00b454a2a5992c5e7e56cd81d11a0b8332963845423675d26216e142a7dd1e8

  • SHA512

    52ca6f827630940d1476160929e7b3a57f6ca91c1fe66b638d57b1f4e339f3af55df49d305955251af59dd15cec6055e502428a728453c65c08410c3ae953e9b

  • SSDEEP

    3072:xHWqSC+y50cm1tnRd5GK/fObT/bGinhssp9nPVmvEfL2co3ZwURmkPiR/+5kS3h:gqSC+Lcm1Dd0K/fObT/bGihssp1VmvE4

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 47 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d00b454a2a5992c5e7e56cd81d11a0b8332963845423675d26216e142a7dd1e8.exe
    "C:\Users\Admin\AppData\Local\Temp\d00b454a2a5992c5e7e56cd81d11a0b8332963845423675d26216e142a7dd1e8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Users\Admin\reogex.exe
      "C:\Users\Admin\reogex.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\reogex.exe

    Filesize

    180KB

    MD5

    779b6cde9f8057c6579dc74f3374c996

    SHA1

    c26e4620d3043997361e1b653ea2f2e616ca1c8c

    SHA256

    5def66b86fea8762c1c8b1ab34aea0cd756b0e7771b8e993eb6239ebe65f51cf

    SHA512

    ad31d85340dd14ab68b0a1441f28b7dafab3ae8df27e5b4d4bf8f5f0a835710b000a9351c2561d93975fd9096d4d2973b0d7a2d178f77ec2729cd67b5ef1fd56

  • C:\Users\Admin\reogex.exe

    Filesize

    180KB

    MD5

    779b6cde9f8057c6579dc74f3374c996

    SHA1

    c26e4620d3043997361e1b653ea2f2e616ca1c8c

    SHA256

    5def66b86fea8762c1c8b1ab34aea0cd756b0e7771b8e993eb6239ebe65f51cf

    SHA512

    ad31d85340dd14ab68b0a1441f28b7dafab3ae8df27e5b4d4bf8f5f0a835710b000a9351c2561d93975fd9096d4d2973b0d7a2d178f77ec2729cd67b5ef1fd56

  • \Users\Admin\reogex.exe

    Filesize

    180KB

    MD5

    779b6cde9f8057c6579dc74f3374c996

    SHA1

    c26e4620d3043997361e1b653ea2f2e616ca1c8c

    SHA256

    5def66b86fea8762c1c8b1ab34aea0cd756b0e7771b8e993eb6239ebe65f51cf

    SHA512

    ad31d85340dd14ab68b0a1441f28b7dafab3ae8df27e5b4d4bf8f5f0a835710b000a9351c2561d93975fd9096d4d2973b0d7a2d178f77ec2729cd67b5ef1fd56

  • \Users\Admin\reogex.exe

    Filesize

    180KB

    MD5

    779b6cde9f8057c6579dc74f3374c996

    SHA1

    c26e4620d3043997361e1b653ea2f2e616ca1c8c

    SHA256

    5def66b86fea8762c1c8b1ab34aea0cd756b0e7771b8e993eb6239ebe65f51cf

    SHA512

    ad31d85340dd14ab68b0a1441f28b7dafab3ae8df27e5b4d4bf8f5f0a835710b000a9351c2561d93975fd9096d4d2973b0d7a2d178f77ec2729cd67b5ef1fd56

  • memory/1796-56-0x0000000075C81000-0x0000000075C83000-memory.dmp

    Filesize

    8KB