Analysis

  • max time kernel
    160s
  • max time network
    83s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 23:31

General

  • Target

    987d7eeef959a014309ecd9494d67840f6e3b301ee0c4997c911bf3443c64a5a.exe

  • Size

    152KB

  • MD5

    0d3ca9536c41e3d337bcc617eea01184

  • SHA1

    9d7d8716e665fd5c1b92656207118ea078aac4ea

  • SHA256

    987d7eeef959a014309ecd9494d67840f6e3b301ee0c4997c911bf3443c64a5a

  • SHA512

    34334825a02db3ec8b4d7d894d0a3186882894c1c59f8a54e6b5f7db8722fbd98dd14cc4c7b7cd3f9620f49caa9ddb6d8b0b7af522cb0ca49d208bd971f6ec37

  • SSDEEP

    3072:ijjxyTX5TASCDGZRImwnpDT/B660vYSrwCLzsN01jsvmusvT:iATqSREnpDT/M60vYSrwCLLsvs

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\987d7eeef959a014309ecd9494d67840f6e3b301ee0c4997c911bf3443c64a5a.exe
    "C:\Users\Admin\AppData\Local\Temp\987d7eeef959a014309ecd9494d67840f6e3b301ee0c4997c911bf3443c64a5a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\loeti.exe
      "C:\Users\Admin\loeti.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\loeti.exe

    Filesize

    152KB

    MD5

    02635bd9396ceec581c731e82ba5dd47

    SHA1

    0613a6e0fa9c286c8f4366bd27c354965cd791d8

    SHA256

    e40f9240c36de3e8f80d55bda6cfa868ec97b80e18ce86f4d9b424222ace3e1b

    SHA512

    f8dc3818973378c22396c2fc84b986fb1fef00e4b76617b7168a23e3adaf51e2567f5e93b21a14f2b4a0011321f6d6811f4e0f6e2dc24da66923505cc9bd434f

  • C:\Users\Admin\loeti.exe

    Filesize

    152KB

    MD5

    02635bd9396ceec581c731e82ba5dd47

    SHA1

    0613a6e0fa9c286c8f4366bd27c354965cd791d8

    SHA256

    e40f9240c36de3e8f80d55bda6cfa868ec97b80e18ce86f4d9b424222ace3e1b

    SHA512

    f8dc3818973378c22396c2fc84b986fb1fef00e4b76617b7168a23e3adaf51e2567f5e93b21a14f2b4a0011321f6d6811f4e0f6e2dc24da66923505cc9bd434f

  • \Users\Admin\loeti.exe

    Filesize

    152KB

    MD5

    02635bd9396ceec581c731e82ba5dd47

    SHA1

    0613a6e0fa9c286c8f4366bd27c354965cd791d8

    SHA256

    e40f9240c36de3e8f80d55bda6cfa868ec97b80e18ce86f4d9b424222ace3e1b

    SHA512

    f8dc3818973378c22396c2fc84b986fb1fef00e4b76617b7168a23e3adaf51e2567f5e93b21a14f2b4a0011321f6d6811f4e0f6e2dc24da66923505cc9bd434f

  • \Users\Admin\loeti.exe

    Filesize

    152KB

    MD5

    02635bd9396ceec581c731e82ba5dd47

    SHA1

    0613a6e0fa9c286c8f4366bd27c354965cd791d8

    SHA256

    e40f9240c36de3e8f80d55bda6cfa868ec97b80e18ce86f4d9b424222ace3e1b

    SHA512

    f8dc3818973378c22396c2fc84b986fb1fef00e4b76617b7168a23e3adaf51e2567f5e93b21a14f2b4a0011321f6d6811f4e0f6e2dc24da66923505cc9bd434f

  • memory/1376-56-0x0000000074D81000-0x0000000074D83000-memory.dmp

    Filesize

    8KB