Analysis

  • max time kernel
    153s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 09:14

General

  • Target

    f5409128bde9c06dbd832bf833868d786ff46769e6f16971b579f735f2f910d4.exe

  • Size

    192KB

  • MD5

    004918ec7b16999ede2e98283bc6ff57

  • SHA1

    18d6a56675b8851fe1e96a169caa689ff5e653a8

  • SHA256

    f5409128bde9c06dbd832bf833868d786ff46769e6f16971b579f735f2f910d4

  • SHA512

    b10f3005fd9af68dac554436ea19336d12d9858174eaca8d4ae2b39bcdf17225f167b8de5e7b72381c7367752571faf0fd4528a77e6695017371f806553f4acd

  • SSDEEP

    3072:PJ1ZuCWv2JQcFBKBJy6apbuD2VMbj1hlUywVbo9lk:PxBWvUFIJlapu2V21r/di

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5409128bde9c06dbd832bf833868d786ff46769e6f16971b579f735f2f910d4.exe
    "C:\Users\Admin\AppData\Local\Temp\f5409128bde9c06dbd832bf833868d786ff46769e6f16971b579f735f2f910d4.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\leianil.exe
      "C:\Users\Admin\leianil.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\leianil.exe

    Filesize

    192KB

    MD5

    2a00aa71baa25383ada5c56b30ac98b3

    SHA1

    7208af0c8b0b1c5406f54e7e79053eebc3b396eb

    SHA256

    7b8f3f8147e04fcffa6abda133268498e45ccdee2ac678374c9e7505b07c397c

    SHA512

    6738e27f9ea94b79090de6638eddbd087cf5278f702f8e8ef6063ecd299f2e5810ba1eb491c1ef814add90c9b3e7114688c8b775d79e8f05df78966bc3a2641e

  • C:\Users\Admin\leianil.exe

    Filesize

    192KB

    MD5

    2a00aa71baa25383ada5c56b30ac98b3

    SHA1

    7208af0c8b0b1c5406f54e7e79053eebc3b396eb

    SHA256

    7b8f3f8147e04fcffa6abda133268498e45ccdee2ac678374c9e7505b07c397c

    SHA512

    6738e27f9ea94b79090de6638eddbd087cf5278f702f8e8ef6063ecd299f2e5810ba1eb491c1ef814add90c9b3e7114688c8b775d79e8f05df78966bc3a2641e

  • \Users\Admin\leianil.exe

    Filesize

    192KB

    MD5

    2a00aa71baa25383ada5c56b30ac98b3

    SHA1

    7208af0c8b0b1c5406f54e7e79053eebc3b396eb

    SHA256

    7b8f3f8147e04fcffa6abda133268498e45ccdee2ac678374c9e7505b07c397c

    SHA512

    6738e27f9ea94b79090de6638eddbd087cf5278f702f8e8ef6063ecd299f2e5810ba1eb491c1ef814add90c9b3e7114688c8b775d79e8f05df78966bc3a2641e

  • \Users\Admin\leianil.exe

    Filesize

    192KB

    MD5

    2a00aa71baa25383ada5c56b30ac98b3

    SHA1

    7208af0c8b0b1c5406f54e7e79053eebc3b396eb

    SHA256

    7b8f3f8147e04fcffa6abda133268498e45ccdee2ac678374c9e7505b07c397c

    SHA512

    6738e27f9ea94b79090de6638eddbd087cf5278f702f8e8ef6063ecd299f2e5810ba1eb491c1ef814add90c9b3e7114688c8b775d79e8f05df78966bc3a2641e

  • memory/1992-56-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB