Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 23:40

General

  • Target

    b3d060397832cf67f53c02cdbb10704985552bc9565952dcefbd5c56c272cbd9.exe

  • Size

    216KB

  • MD5

    f5eed679e4ffefd94039f1fec3519b8b

  • SHA1

    d0a00479614e86df6907ab6171c64ce54e4a91a1

  • SHA256

    b3d060397832cf67f53c02cdbb10704985552bc9565952dcefbd5c56c272cbd9

  • SHA512

    2c70f4ab6a49e9193ee3a145a29748047e9784705feb2c0cddb8229d02c41213778cfe4f91c0c4d41fd279e1c5143f8435d193ea817d5ab0bcd4736a11a00452

  • SSDEEP

    6144:WCRIpcN4LCdxCvhoyRhU9/YcHpynEsy+XrDvCLRFktgaCoquob4IDQSp+pP1N:WCMccCdxCvhoyRhU9/YcJynEsy+XrDv7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3d060397832cf67f53c02cdbb10704985552bc9565952dcefbd5c56c272cbd9.exe
    "C:\Users\Admin\AppData\Local\Temp\b3d060397832cf67f53c02cdbb10704985552bc9565952dcefbd5c56c272cbd9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Users\Admin\souhul.exe
      "C:\Users\Admin\souhul.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:884

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\souhul.exe

          Filesize

          216KB

          MD5

          4d3826483121acea85ef9af7409c7c6d

          SHA1

          34b9dd634e620df618611441045d1935db8457c1

          SHA256

          fef15126da1f87e712a097992c3136ad103e02c11c79e474a5389666dda407ff

          SHA512

          d176ff4794d8e61d6846d477c4e913ccde3a1d89527ec33affa22e272254ebfdde4510668154fb60cb283a6ac91437398107bcfc4f5922da58732ae80cd4fea8

        • C:\Users\Admin\souhul.exe

          Filesize

          216KB

          MD5

          4d3826483121acea85ef9af7409c7c6d

          SHA1

          34b9dd634e620df618611441045d1935db8457c1

          SHA256

          fef15126da1f87e712a097992c3136ad103e02c11c79e474a5389666dda407ff

          SHA512

          d176ff4794d8e61d6846d477c4e913ccde3a1d89527ec33affa22e272254ebfdde4510668154fb60cb283a6ac91437398107bcfc4f5922da58732ae80cd4fea8

        • \Users\Admin\souhul.exe

          Filesize

          216KB

          MD5

          4d3826483121acea85ef9af7409c7c6d

          SHA1

          34b9dd634e620df618611441045d1935db8457c1

          SHA256

          fef15126da1f87e712a097992c3136ad103e02c11c79e474a5389666dda407ff

          SHA512

          d176ff4794d8e61d6846d477c4e913ccde3a1d89527ec33affa22e272254ebfdde4510668154fb60cb283a6ac91437398107bcfc4f5922da58732ae80cd4fea8

        • \Users\Admin\souhul.exe

          Filesize

          216KB

          MD5

          4d3826483121acea85ef9af7409c7c6d

          SHA1

          34b9dd634e620df618611441045d1935db8457c1

          SHA256

          fef15126da1f87e712a097992c3136ad103e02c11c79e474a5389666dda407ff

          SHA512

          d176ff4794d8e61d6846d477c4e913ccde3a1d89527ec33affa22e272254ebfdde4510668154fb60cb283a6ac91437398107bcfc4f5922da58732ae80cd4fea8

        • memory/1336-56-0x00000000762D1000-0x00000000762D3000-memory.dmp

          Filesize

          8KB