Analysis

  • max time kernel
    177s
  • max time network
    201s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 23:14

General

  • Target

    dbe74e78f1a0d7e5710bfdb5336f3ce8bef72f493d6626dec5a70e002f9355ba.exe

  • Size

    88KB

  • MD5

    286c4dacfd822e69819aa41bb92e6a11

  • SHA1

    973c054c384c0e9d2d6d14a941ed1f2c1c93a63d

  • SHA256

    dbe74e78f1a0d7e5710bfdb5336f3ce8bef72f493d6626dec5a70e002f9355ba

  • SHA512

    a0b23aaad6faf5d19370affca3d6c62bf786fc1c4158895b388b6e4afd9700bb08e469f511d9548c436bb761b1a7c61efa13960f46a6a0b0943afb0c7b915b23

  • SSDEEP

    1536:h6Qw1NHewglFEJ71b/gYmHVwrESNQdGV4Hj:QQGQviJ71bkXGsj

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 58 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbe74e78f1a0d7e5710bfdb5336f3ce8bef72f493d6626dec5a70e002f9355ba.exe
    "C:\Users\Admin\AppData\Local\Temp\dbe74e78f1a0d7e5710bfdb5336f3ce8bef72f493d6626dec5a70e002f9355ba.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\jvqiiv.exe
      "C:\Users\Admin\jvqiiv.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jvqiiv.exe

    Filesize

    88KB

    MD5

    96af0f49c4c9a8246154d3bb8c7d7838

    SHA1

    91cd638b45033f6acf3ed79f6658389810d58200

    SHA256

    a89482b8b36c7ec3d029b07fc5b9a432b192c7f237e6025668111666c071fd6c

    SHA512

    6765728177ce7c9152a44550edef741acf385f60c7ceb8e7db2075229cb33087c7183d22fe206f3a960b21b6d3daccef0dbb279e5653c3cdec73852ea84e541c

  • C:\Users\Admin\jvqiiv.exe

    Filesize

    88KB

    MD5

    96af0f49c4c9a8246154d3bb8c7d7838

    SHA1

    91cd638b45033f6acf3ed79f6658389810d58200

    SHA256

    a89482b8b36c7ec3d029b07fc5b9a432b192c7f237e6025668111666c071fd6c

    SHA512

    6765728177ce7c9152a44550edef741acf385f60c7ceb8e7db2075229cb33087c7183d22fe206f3a960b21b6d3daccef0dbb279e5653c3cdec73852ea84e541c

  • \Users\Admin\jvqiiv.exe

    Filesize

    88KB

    MD5

    96af0f49c4c9a8246154d3bb8c7d7838

    SHA1

    91cd638b45033f6acf3ed79f6658389810d58200

    SHA256

    a89482b8b36c7ec3d029b07fc5b9a432b192c7f237e6025668111666c071fd6c

    SHA512

    6765728177ce7c9152a44550edef741acf385f60c7ceb8e7db2075229cb33087c7183d22fe206f3a960b21b6d3daccef0dbb279e5653c3cdec73852ea84e541c

  • \Users\Admin\jvqiiv.exe

    Filesize

    88KB

    MD5

    96af0f49c4c9a8246154d3bb8c7d7838

    SHA1

    91cd638b45033f6acf3ed79f6658389810d58200

    SHA256

    a89482b8b36c7ec3d029b07fc5b9a432b192c7f237e6025668111666c071fd6c

    SHA512

    6765728177ce7c9152a44550edef741acf385f60c7ceb8e7db2075229cb33087c7183d22fe206f3a960b21b6d3daccef0dbb279e5653c3cdec73852ea84e541c

  • memory/1224-56-0x0000000075C41000-0x0000000075C43000-memory.dmp

    Filesize

    8KB