Analysis

  • max time kernel
    154s
  • max time network
    83s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 23:49

General

  • Target

    e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe

  • Size

    88KB

  • MD5

    9798ed23628b86dbf1eccb8f4cd96c8f

  • SHA1

    afba089cde1ecf6b2f1df164a976418d67b7fb94

  • SHA256

    e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32

  • SHA512

    c304ba9829f5b6af0cbe146d77b2f7c4c2c6d346db538de8dd33702d8aa8e77aa3806194d7eea7daa0eed15a0c98bcb5e8c07be7093d504acc1e002bec59c336

  • SSDEEP

    768:v26jxOJETcmioIHpFeh6RM1rA8dOsk7jbqqRkA5okK1Dfsvu+Yh9o1XjLftmz:v2cx/AmiHLFUnzJA5o9BfIu+I+XjLlm

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe
    "C:\Users\Admin\AppData\Local\Temp\e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\haaiw.exe
      "C:\Users\Admin\haaiw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\haaiw.exe

    Filesize

    88KB

    MD5

    5aa75587712a23c1d820b66a07f35fb8

    SHA1

    ebeac094314867b1b7c0eb9a388beafc3c7b016a

    SHA256

    3b11b6e816ba33080572f1698596185c46f6b13ef1aa6b4a81057921ca3648fd

    SHA512

    46ce817455d281b9b202b2a82ddbfb3c1cbcd03e36b58173a38895c0866979fe78d78edf81caedd2011f94f03844d9635f87e5dc341c9969e676e611d7ed94f3

  • C:\Users\Admin\haaiw.exe

    Filesize

    88KB

    MD5

    5aa75587712a23c1d820b66a07f35fb8

    SHA1

    ebeac094314867b1b7c0eb9a388beafc3c7b016a

    SHA256

    3b11b6e816ba33080572f1698596185c46f6b13ef1aa6b4a81057921ca3648fd

    SHA512

    46ce817455d281b9b202b2a82ddbfb3c1cbcd03e36b58173a38895c0866979fe78d78edf81caedd2011f94f03844d9635f87e5dc341c9969e676e611d7ed94f3

  • \Users\Admin\haaiw.exe

    Filesize

    88KB

    MD5

    5aa75587712a23c1d820b66a07f35fb8

    SHA1

    ebeac094314867b1b7c0eb9a388beafc3c7b016a

    SHA256

    3b11b6e816ba33080572f1698596185c46f6b13ef1aa6b4a81057921ca3648fd

    SHA512

    46ce817455d281b9b202b2a82ddbfb3c1cbcd03e36b58173a38895c0866979fe78d78edf81caedd2011f94f03844d9635f87e5dc341c9969e676e611d7ed94f3

  • \Users\Admin\haaiw.exe

    Filesize

    88KB

    MD5

    5aa75587712a23c1d820b66a07f35fb8

    SHA1

    ebeac094314867b1b7c0eb9a388beafc3c7b016a

    SHA256

    3b11b6e816ba33080572f1698596185c46f6b13ef1aa6b4a81057921ca3648fd

    SHA512

    46ce817455d281b9b202b2a82ddbfb3c1cbcd03e36b58173a38895c0866979fe78d78edf81caedd2011f94f03844d9635f87e5dc341c9969e676e611d7ed94f3

  • memory/1848-56-0x0000000075241000-0x0000000075243000-memory.dmp

    Filesize

    8KB