Analysis
-
max time kernel
153s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe
Resource
win10v2004-20221111-en
General
-
Target
aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe
-
Size
115KB
-
MD5
dd4d7fff0c01b9965cf254e918721948
-
SHA1
ab0411ffa26efd9b48bc479ac9964ff0ceffa319
-
SHA256
aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98
-
SHA512
591cf5af868a58ff04df9117fd9f0ae67aca953c67d89ddfd5a5fb82eed34684976ee78ef3754b9ca7b63d12dec1de368f210b0a2a7500538791607b1a487c7f
-
SSDEEP
1536:OAwWU+hDA5bTxzoOaxbovYXr+blAPxZEy2eZPyXEDgPt8JSZ/IYm4c:2WzhM5bTxzWxbov4PPvEmPJDgWJSNBc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1568 Wnz-Hack.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe 1996 aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe 1568 Wnz-Hack.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1568 Wnz-Hack.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1568 1996 aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe 28 PID 1996 wrote to memory of 1568 1996 aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe 28 PID 1996 wrote to memory of 1568 1996 aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe 28 PID 1996 wrote to memory of 1568 1996 aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe"C:\Users\Admin\AppData\Local\Temp\aa89030c3d95d51af183c5d60f5e9e1e9622cb956155e7b38e45f5e5bcc0ac98.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\~sfx001B218F6C\Wnz-Hack.exe"C:\Users\Admin\AppData\Local\Temp\~sfx001B218F6C\Wnz-Hack.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD58af5382979e468093cb0f271cb0a89cf
SHA1a302ab4cca01c25ee26dfe56d2620fcd54fd2298
SHA256405b8898881f0d7364b467a61ef1d9380b7b89e9eb8d8c42dc53682d4ba775cd
SHA512914001b40bc85966f7dc8c606fbbcfbd21dbf67a18df2de97a97f5df24e162a92b23d2242cf101a56b747920c15d9649cd6652a2b0ef72bd17952153718fe5d8
-
Filesize
32KB
MD58af5382979e468093cb0f271cb0a89cf
SHA1a302ab4cca01c25ee26dfe56d2620fcd54fd2298
SHA256405b8898881f0d7364b467a61ef1d9380b7b89e9eb8d8c42dc53682d4ba775cd
SHA512914001b40bc85966f7dc8c606fbbcfbd21dbf67a18df2de97a97f5df24e162a92b23d2242cf101a56b747920c15d9649cd6652a2b0ef72bd17952153718fe5d8
-
Filesize
32KB
MD58af5382979e468093cb0f271cb0a89cf
SHA1a302ab4cca01c25ee26dfe56d2620fcd54fd2298
SHA256405b8898881f0d7364b467a61ef1d9380b7b89e9eb8d8c42dc53682d4ba775cd
SHA512914001b40bc85966f7dc8c606fbbcfbd21dbf67a18df2de97a97f5df24e162a92b23d2242cf101a56b747920c15d9649cd6652a2b0ef72bd17952153718fe5d8
-
Filesize
32KB
MD58af5382979e468093cb0f271cb0a89cf
SHA1a302ab4cca01c25ee26dfe56d2620fcd54fd2298
SHA256405b8898881f0d7364b467a61ef1d9380b7b89e9eb8d8c42dc53682d4ba775cd
SHA512914001b40bc85966f7dc8c606fbbcfbd21dbf67a18df2de97a97f5df24e162a92b23d2242cf101a56b747920c15d9649cd6652a2b0ef72bd17952153718fe5d8