Analysis

  • max time kernel
    151s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 23:38

General

  • Target

    9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe

  • Size

    284KB

  • MD5

    5897f884e2ff480b59ab3ce3a3c784f6

  • SHA1

    4ee772d819de27618fb74214d58dfc980ab408ba

  • SHA256

    9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e

  • SHA512

    47ed906135624b66097e7c3e4f2213ce5270532d6664ba399a55a58165705091e9356874430a9661acd37e207c3930f051b7412921517e888af33777d039e723

  • SSDEEP

    6144:RP9qiyChL5Rjda3P/fis6Do/uP+tFb84ly7a7:99qiyCF5xI3PH96DoWPYb8Y

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe
    "C:\Users\Admin\AppData\Local\Temp\9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Users\Admin\fiigor.exe
      "C:\Users\Admin\fiigor.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fiigor.exe

    Filesize

    284KB

    MD5

    60eb7bc5fca67724bfb5b5837dba9717

    SHA1

    c01d7cd81a5cdb54bdb3024fbfe89953126dbd14

    SHA256

    19555cd6a73360594e3109c603160a09ae5bb044e4f2ec53debde7892b3c4571

    SHA512

    c462efdc12b9e59c712d610dba7773832ac69c58dbfa27a5e58aaa17564b1cff818cdbe7564291c381a682c2424d3b88aac6ddacb64930c3981d060180c68fb8

  • C:\Users\Admin\fiigor.exe

    Filesize

    284KB

    MD5

    60eb7bc5fca67724bfb5b5837dba9717

    SHA1

    c01d7cd81a5cdb54bdb3024fbfe89953126dbd14

    SHA256

    19555cd6a73360594e3109c603160a09ae5bb044e4f2ec53debde7892b3c4571

    SHA512

    c462efdc12b9e59c712d610dba7773832ac69c58dbfa27a5e58aaa17564b1cff818cdbe7564291c381a682c2424d3b88aac6ddacb64930c3981d060180c68fb8

  • \Users\Admin\fiigor.exe

    Filesize

    284KB

    MD5

    60eb7bc5fca67724bfb5b5837dba9717

    SHA1

    c01d7cd81a5cdb54bdb3024fbfe89953126dbd14

    SHA256

    19555cd6a73360594e3109c603160a09ae5bb044e4f2ec53debde7892b3c4571

    SHA512

    c462efdc12b9e59c712d610dba7773832ac69c58dbfa27a5e58aaa17564b1cff818cdbe7564291c381a682c2424d3b88aac6ddacb64930c3981d060180c68fb8

  • \Users\Admin\fiigor.exe

    Filesize

    284KB

    MD5

    60eb7bc5fca67724bfb5b5837dba9717

    SHA1

    c01d7cd81a5cdb54bdb3024fbfe89953126dbd14

    SHA256

    19555cd6a73360594e3109c603160a09ae5bb044e4f2ec53debde7892b3c4571

    SHA512

    c462efdc12b9e59c712d610dba7773832ac69c58dbfa27a5e58aaa17564b1cff818cdbe7564291c381a682c2424d3b88aac6ddacb64930c3981d060180c68fb8

  • memory/1000-56-0x0000000076561000-0x0000000076563000-memory.dmp

    Filesize

    8KB