Analysis

  • max time kernel
    151s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 09:16

General

  • Target

    e3dc7facef810c9b10dc20b81e8c96a008d13d11a38dafbca1b00d4137fe72ae.exe

  • Size

    104KB

  • MD5

    a50f03c8b86c7eb2aadb0a4d6e4bc614

  • SHA1

    71158ea58e9d79665a2d66d935797dab39810d40

  • SHA256

    e3dc7facef810c9b10dc20b81e8c96a008d13d11a38dafbca1b00d4137fe72ae

  • SHA512

    bb9087f53e3de729b01e2dc17faf5fe3798bac75682a21b06c38f583224fa4f9a9c8cef319dca77883def855b299f39bbdc6152f8c25897f36a9e5127ed9f39d

  • SSDEEP

    1536:QpLRvx+u+s+HBchhQKNIqpOcQv0sTEFSocloXjLl03F:M5+eiKNZJQv0sTNo3m3F

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3dc7facef810c9b10dc20b81e8c96a008d13d11a38dafbca1b00d4137fe72ae.exe
    "C:\Users\Admin\AppData\Local\Temp\e3dc7facef810c9b10dc20b81e8c96a008d13d11a38dafbca1b00d4137fe72ae.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\duiedi.exe
      "C:\Users\Admin\duiedi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\duiedi.exe

    Filesize

    104KB

    MD5

    ecdc9fce0764248898983b22a169ec45

    SHA1

    e5b86273e07dbd0dca694bbdb0d78661b9d63611

    SHA256

    a46dedcef8ef08b13ee620862661b764b3b57cdbffe1d479461b3b49b827772a

    SHA512

    9700e3410c27fb0a9d8630a58758134ba100836dc81e08cbf32c959f2b0725905db212655f32d7ba69020a53404a3f09ce37930a5c94d93136a361275fe826d5

  • C:\Users\Admin\duiedi.exe

    Filesize

    104KB

    MD5

    ecdc9fce0764248898983b22a169ec45

    SHA1

    e5b86273e07dbd0dca694bbdb0d78661b9d63611

    SHA256

    a46dedcef8ef08b13ee620862661b764b3b57cdbffe1d479461b3b49b827772a

    SHA512

    9700e3410c27fb0a9d8630a58758134ba100836dc81e08cbf32c959f2b0725905db212655f32d7ba69020a53404a3f09ce37930a5c94d93136a361275fe826d5

  • \Users\Admin\duiedi.exe

    Filesize

    104KB

    MD5

    ecdc9fce0764248898983b22a169ec45

    SHA1

    e5b86273e07dbd0dca694bbdb0d78661b9d63611

    SHA256

    a46dedcef8ef08b13ee620862661b764b3b57cdbffe1d479461b3b49b827772a

    SHA512

    9700e3410c27fb0a9d8630a58758134ba100836dc81e08cbf32c959f2b0725905db212655f32d7ba69020a53404a3f09ce37930a5c94d93136a361275fe826d5

  • \Users\Admin\duiedi.exe

    Filesize

    104KB

    MD5

    ecdc9fce0764248898983b22a169ec45

    SHA1

    e5b86273e07dbd0dca694bbdb0d78661b9d63611

    SHA256

    a46dedcef8ef08b13ee620862661b764b3b57cdbffe1d479461b3b49b827772a

    SHA512

    9700e3410c27fb0a9d8630a58758134ba100836dc81e08cbf32c959f2b0725905db212655f32d7ba69020a53404a3f09ce37930a5c94d93136a361275fe826d5

  • memory/1980-56-0x00000000756B1000-0x00000000756B3000-memory.dmp

    Filesize

    8KB