Analysis

  • max time kernel
    152s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 23:37

General

  • Target

    c24da792856aa34b2b2e5c5e4d94993c8af3c27bc0edc943c7dcf47808e60d49.exe

  • Size

    236KB

  • MD5

    7884dbaad3d606e1e658dd80ca5a35b1

  • SHA1

    1bb7822ae14e1b0ced9c999b3f2ee4f00976f796

  • SHA256

    c24da792856aa34b2b2e5c5e4d94993c8af3c27bc0edc943c7dcf47808e60d49

  • SHA512

    81f7435f72322759347137d427b58862725233a314d5b72fafe0690da88a9d1dea8b50e7536e62d5327e118805556c61e176ae1ba6a054d747c8a5aef40cdfba

  • SSDEEP

    6144:X8aKCiUNxlBDe2WmHioZW+ZigxpEJAYyXSWIc9sKBar:MkLlBDeLmHioZWEigxpYAYlbc9TBar

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c24da792856aa34b2b2e5c5e4d94993c8af3c27bc0edc943c7dcf47808e60d49.exe
    "C:\Users\Admin\AppData\Local\Temp\c24da792856aa34b2b2e5c5e4d94993c8af3c27bc0edc943c7dcf47808e60d49.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Users\Admin\wouise.exe
      "C:\Users\Admin\wouise.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:820

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\wouise.exe

          Filesize

          236KB

          MD5

          b42395f1af8d2a742a977c78f3d11548

          SHA1

          d643b9ec6ca13e962e02754d3e7e9fb841b3da83

          SHA256

          ed60f1a62892640c0113077980c8317d91665dcc02ada7d869d8fb2f6acd1a4d

          SHA512

          e36e33ed4dadf3db2c748d53e363f537b797f709dcef3dbaf3052c34b5751005731bd9d29f167025dcfeb72f24d12df2cc7bff8b9ad1e710e16343f94a2f2090

        • C:\Users\Admin\wouise.exe

          Filesize

          236KB

          MD5

          b42395f1af8d2a742a977c78f3d11548

          SHA1

          d643b9ec6ca13e962e02754d3e7e9fb841b3da83

          SHA256

          ed60f1a62892640c0113077980c8317d91665dcc02ada7d869d8fb2f6acd1a4d

          SHA512

          e36e33ed4dadf3db2c748d53e363f537b797f709dcef3dbaf3052c34b5751005731bd9d29f167025dcfeb72f24d12df2cc7bff8b9ad1e710e16343f94a2f2090

        • \Users\Admin\wouise.exe

          Filesize

          236KB

          MD5

          b42395f1af8d2a742a977c78f3d11548

          SHA1

          d643b9ec6ca13e962e02754d3e7e9fb841b3da83

          SHA256

          ed60f1a62892640c0113077980c8317d91665dcc02ada7d869d8fb2f6acd1a4d

          SHA512

          e36e33ed4dadf3db2c748d53e363f537b797f709dcef3dbaf3052c34b5751005731bd9d29f167025dcfeb72f24d12df2cc7bff8b9ad1e710e16343f94a2f2090

        • \Users\Admin\wouise.exe

          Filesize

          236KB

          MD5

          b42395f1af8d2a742a977c78f3d11548

          SHA1

          d643b9ec6ca13e962e02754d3e7e9fb841b3da83

          SHA256

          ed60f1a62892640c0113077980c8317d91665dcc02ada7d869d8fb2f6acd1a4d

          SHA512

          e36e33ed4dadf3db2c748d53e363f537b797f709dcef3dbaf3052c34b5751005731bd9d29f167025dcfeb72f24d12df2cc7bff8b9ad1e710e16343f94a2f2090

        • memory/1464-56-0x00000000758B1000-0x00000000758B3000-memory.dmp

          Filesize

          8KB