Analysis

  • max time kernel
    151s
  • max time network
    78s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 22:49

General

  • Target

    c0d6d30a9a4493e88df87b10dc9e3f92606f390980194d64787e6890f8860205.exe

  • Size

    272KB

  • MD5

    fdb8c9a2132aa8881b86da5521e19964

  • SHA1

    cd4e3c9faaceee49167746994e1c5fbf4326b4e3

  • SHA256

    c0d6d30a9a4493e88df87b10dc9e3f92606f390980194d64787e6890f8860205

  • SHA512

    8533b1054a73d75507c3aefa5e7172ccdccde8b00d553e1de6f4cd74c6ec93a715d20150a5ffdf82175136e099669fb858444c820e8516f8ec7948ab41b70ac2

  • SSDEEP

    6144:VY4d871eE79p6aWkk2QPxLGlLrdAHaSA+N43UfwV8r6vNJU2wagnUC5:VYA8ZUGlLr7/+NnI8r2gB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0d6d30a9a4493e88df87b10dc9e3f92606f390980194d64787e6890f8860205.exe
    "C:\Users\Admin\AppData\Local\Temp\c0d6d30a9a4493e88df87b10dc9e3f92606f390980194d64787e6890f8860205.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Users\Admin\maelak.exe
      "C:\Users\Admin\maelak.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1480

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\maelak.exe

          Filesize

          272KB

          MD5

          de8f96948331a7403997b2902322ee4b

          SHA1

          85a6c8b74db1ad03630455cf165fd0052b56a4d1

          SHA256

          41b9f1b7e16cd863b696a31cfc6900d3ff7a4d628d858f25771faccea5873291

          SHA512

          f685b01542f818a1e935e03265a2df08acfe528665cda6862563dc5a6f4da355431d09f66d0954197b9a21ce3b411b287d76f8ec2252b5747a0a8b1ff6d4dd1d

        • C:\Users\Admin\maelak.exe

          Filesize

          272KB

          MD5

          de8f96948331a7403997b2902322ee4b

          SHA1

          85a6c8b74db1ad03630455cf165fd0052b56a4d1

          SHA256

          41b9f1b7e16cd863b696a31cfc6900d3ff7a4d628d858f25771faccea5873291

          SHA512

          f685b01542f818a1e935e03265a2df08acfe528665cda6862563dc5a6f4da355431d09f66d0954197b9a21ce3b411b287d76f8ec2252b5747a0a8b1ff6d4dd1d

        • \Users\Admin\maelak.exe

          Filesize

          272KB

          MD5

          de8f96948331a7403997b2902322ee4b

          SHA1

          85a6c8b74db1ad03630455cf165fd0052b56a4d1

          SHA256

          41b9f1b7e16cd863b696a31cfc6900d3ff7a4d628d858f25771faccea5873291

          SHA512

          f685b01542f818a1e935e03265a2df08acfe528665cda6862563dc5a6f4da355431d09f66d0954197b9a21ce3b411b287d76f8ec2252b5747a0a8b1ff6d4dd1d

        • \Users\Admin\maelak.exe

          Filesize

          272KB

          MD5

          de8f96948331a7403997b2902322ee4b

          SHA1

          85a6c8b74db1ad03630455cf165fd0052b56a4d1

          SHA256

          41b9f1b7e16cd863b696a31cfc6900d3ff7a4d628d858f25771faccea5873291

          SHA512

          f685b01542f818a1e935e03265a2df08acfe528665cda6862563dc5a6f4da355431d09f66d0954197b9a21ce3b411b287d76f8ec2252b5747a0a8b1ff6d4dd1d

        • memory/956-56-0x0000000075F21000-0x0000000075F23000-memory.dmp

          Filesize

          8KB