Analysis

  • max time kernel
    188s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 23:42

General

  • Target

    89a97c15a93850d408ce52ca3d815b1212b8b69e5a3875582a58e5475d55f255.exe

  • Size

    312KB

  • MD5

    877c58e2535ab080b0584a9d4f9c0801

  • SHA1

    cf56583ae4ef990cb8be453fef428e7aaaaf1e22

  • SHA256

    89a97c15a93850d408ce52ca3d815b1212b8b69e5a3875582a58e5475d55f255

  • SHA512

    958ac7fd14003fbe11e38bb75bac7242b119a6908913921572a98f12ede648d72074d2acbc4d9d72014b547f867fa7b65e996f052af746229395856ebb938324

  • SSDEEP

    6144:cQbc0f7XP+g3AGJpWVzuXRHeEgRK/fObT/bGiJKv6R7MkZ4lUr8W9HuOGKhvsMMF:Hw27/XvLWpuReEgRK/fObT/bGiJlMkZg

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89a97c15a93850d408ce52ca3d815b1212b8b69e5a3875582a58e5475d55f255.exe
    "C:\Users\Admin\AppData\Local\Temp\89a97c15a93850d408ce52ca3d815b1212b8b69e5a3875582a58e5475d55f255.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Users\Admin\foefod.exe
      "C:\Users\Admin\foefod.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:584

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\foefod.exe

          Filesize

          312KB

          MD5

          6e2f6f95b250b0575a83b2a845aa372b

          SHA1

          387d0c2cb58bf31003942c5ddb64eb177af4fb5d

          SHA256

          0ba9e9c4381acb9a4ae43e2f472e025381e1bdf704100eeeb150058ab0802781

          SHA512

          cc1f6ac3d91a3cd3b1c3649cae6d92475e5a0ce01c10f0df48fa6e56a7cecb381e3e6b6f87c529905fea42ec4d31526a850cb237e160f8430e08ab0d258b572c

        • C:\Users\Admin\foefod.exe

          Filesize

          312KB

          MD5

          6e2f6f95b250b0575a83b2a845aa372b

          SHA1

          387d0c2cb58bf31003942c5ddb64eb177af4fb5d

          SHA256

          0ba9e9c4381acb9a4ae43e2f472e025381e1bdf704100eeeb150058ab0802781

          SHA512

          cc1f6ac3d91a3cd3b1c3649cae6d92475e5a0ce01c10f0df48fa6e56a7cecb381e3e6b6f87c529905fea42ec4d31526a850cb237e160f8430e08ab0d258b572c

        • \Users\Admin\foefod.exe

          Filesize

          312KB

          MD5

          6e2f6f95b250b0575a83b2a845aa372b

          SHA1

          387d0c2cb58bf31003942c5ddb64eb177af4fb5d

          SHA256

          0ba9e9c4381acb9a4ae43e2f472e025381e1bdf704100eeeb150058ab0802781

          SHA512

          cc1f6ac3d91a3cd3b1c3649cae6d92475e5a0ce01c10f0df48fa6e56a7cecb381e3e6b6f87c529905fea42ec4d31526a850cb237e160f8430e08ab0d258b572c

        • \Users\Admin\foefod.exe

          Filesize

          312KB

          MD5

          6e2f6f95b250b0575a83b2a845aa372b

          SHA1

          387d0c2cb58bf31003942c5ddb64eb177af4fb5d

          SHA256

          0ba9e9c4381acb9a4ae43e2f472e025381e1bdf704100eeeb150058ab0802781

          SHA512

          cc1f6ac3d91a3cd3b1c3649cae6d92475e5a0ce01c10f0df48fa6e56a7cecb381e3e6b6f87c529905fea42ec4d31526a850cb237e160f8430e08ab0d258b572c

        • memory/584-67-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/1004-54-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/1004-57-0x0000000075881000-0x0000000075883000-memory.dmp

          Filesize

          8KB

        • memory/1004-65-0x0000000002E20000-0x0000000002E82000-memory.dmp

          Filesize

          392KB

        • memory/1004-66-0x0000000002E20000-0x0000000002E82000-memory.dmp

          Filesize

          392KB

        • memory/1004-69-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB