Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 23:16

General

  • Target

    a267f61325451a0ac0dddd2146978d41cbf5a8acbbaa848a8f194aeb06497a4d.exe

  • Size

    125KB

  • MD5

    ea77662c1475536b21487a98911b7386

  • SHA1

    e2db6248d739320897f8cbb1146497817fea76ef

  • SHA256

    a267f61325451a0ac0dddd2146978d41cbf5a8acbbaa848a8f194aeb06497a4d

  • SHA512

    fe9022725abf0a863bb638e7f98feefb68d9b79e806b246e9dcdc3d379d17598c3eb6f8fec6cf84d4b56307a5f6d0ba4806a076f1e13969523a928045496d8f3

  • SSDEEP

    3072:MbapLDuLE2goAIl2EwrLSm5WLyD1v6jVAfunNg4K7QmcY+MZGQ:tpLDuLE2gRGoXr5Gyhv6jVAfKglLZG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a267f61325451a0ac0dddd2146978d41cbf5a8acbbaa848a8f194aeb06497a4d.exe
    "C:\Users\Admin\AppData\Local\Temp\a267f61325451a0ac0dddd2146978d41cbf5a8acbbaa848a8f194aeb06497a4d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\Admin.exe
      "C:\Users\Admin\Admin.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1120

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Admin.exe

    Filesize

    125KB

    MD5

    5068d38664877b2759cfafb4690db72e

    SHA1

    406030a0ea5e162bf57138283a685fc95e9362e8

    SHA256

    52e44fcb477e395900139e12fc352b4648b85e121e9f14e20cf25fc9af46f6bf

    SHA512

    336228ca7ffa68e12f5f90b7593e44e234d186e4538f39b8c05d33f119e580b861e9a669dd548478bbb56d16b0d490bd59f35f08f09bc9751a2f0bc75d31566c

  • \Users\Admin\Admin.exe

    Filesize

    125KB

    MD5

    5068d38664877b2759cfafb4690db72e

    SHA1

    406030a0ea5e162bf57138283a685fc95e9362e8

    SHA256

    52e44fcb477e395900139e12fc352b4648b85e121e9f14e20cf25fc9af46f6bf

    SHA512

    336228ca7ffa68e12f5f90b7593e44e234d186e4538f39b8c05d33f119e580b861e9a669dd548478bbb56d16b0d490bd59f35f08f09bc9751a2f0bc75d31566c

  • \Users\Admin\Admin.exe

    Filesize

    125KB

    MD5

    5068d38664877b2759cfafb4690db72e

    SHA1

    406030a0ea5e162bf57138283a685fc95e9362e8

    SHA256

    52e44fcb477e395900139e12fc352b4648b85e121e9f14e20cf25fc9af46f6bf

    SHA512

    336228ca7ffa68e12f5f90b7593e44e234d186e4538f39b8c05d33f119e580b861e9a669dd548478bbb56d16b0d490bd59f35f08f09bc9751a2f0bc75d31566c

  • memory/1120-59-0x0000000000000000-mapping.dmp

  • memory/1880-56-0x0000000075D71000-0x0000000075D73000-memory.dmp

    Filesize

    8KB