Analysis

  • max time kernel
    150s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 10:11

General

  • Target

    8f63e5104e3370a9076890ccfdf42770a44dac3d6a21e9dcc63876ba8df1ec4f.exe

  • Size

    268KB

  • MD5

    5a58f8e02b74e10bec3c5c08e4d799d1

  • SHA1

    7718b32f36ff2e6206046436b4711cd2e3aa5d04

  • SHA256

    8f63e5104e3370a9076890ccfdf42770a44dac3d6a21e9dcc63876ba8df1ec4f

  • SHA512

    412d2ca32dc94b6dd7d9f806cc1c6403d1d5e50ab8bbfd08fb86ab656d27623a6df2c9b63f71c332911f0820ac58fa3122552fb8cdbac065bc6c22001264062c

  • SSDEEP

    6144:Sawz2Eu+yV2PL9JhCNjKV6MG31luID8NLJTPxhMbmNPjiiSI5:SLMs0Nz8tJTZhMiiQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f63e5104e3370a9076890ccfdf42770a44dac3d6a21e9dcc63876ba8df1ec4f.exe
    "C:\Users\Admin\AppData\Local\Temp\8f63e5104e3370a9076890ccfdf42770a44dac3d6a21e9dcc63876ba8df1ec4f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\noexeo.exe
      "C:\Users\Admin\noexeo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1520

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\noexeo.exe

          Filesize

          268KB

          MD5

          19028ba619eb4f7d347a8bd37e76df88

          SHA1

          e8dce6cc9d1bc20c948912f8106aafcc7482b915

          SHA256

          83e58bfb58963b96dc52535b0f6294cc373bf0d0b2c85ceebf15809268d5db1d

          SHA512

          a4f13d43b15d952cd306bbac054bdcc6eb052b6c838891771179b7175c4413be4eed641355beb2a966383f6b0b4327271744dfd5387d5683a467a22008846488

        • C:\Users\Admin\noexeo.exe

          Filesize

          268KB

          MD5

          19028ba619eb4f7d347a8bd37e76df88

          SHA1

          e8dce6cc9d1bc20c948912f8106aafcc7482b915

          SHA256

          83e58bfb58963b96dc52535b0f6294cc373bf0d0b2c85ceebf15809268d5db1d

          SHA512

          a4f13d43b15d952cd306bbac054bdcc6eb052b6c838891771179b7175c4413be4eed641355beb2a966383f6b0b4327271744dfd5387d5683a467a22008846488

        • \Users\Admin\noexeo.exe

          Filesize

          268KB

          MD5

          19028ba619eb4f7d347a8bd37e76df88

          SHA1

          e8dce6cc9d1bc20c948912f8106aafcc7482b915

          SHA256

          83e58bfb58963b96dc52535b0f6294cc373bf0d0b2c85ceebf15809268d5db1d

          SHA512

          a4f13d43b15d952cd306bbac054bdcc6eb052b6c838891771179b7175c4413be4eed641355beb2a966383f6b0b4327271744dfd5387d5683a467a22008846488

        • \Users\Admin\noexeo.exe

          Filesize

          268KB

          MD5

          19028ba619eb4f7d347a8bd37e76df88

          SHA1

          e8dce6cc9d1bc20c948912f8106aafcc7482b915

          SHA256

          83e58bfb58963b96dc52535b0f6294cc373bf0d0b2c85ceebf15809268d5db1d

          SHA512

          a4f13d43b15d952cd306bbac054bdcc6eb052b6c838891771179b7175c4413be4eed641355beb2a966383f6b0b4327271744dfd5387d5683a467a22008846488

        • memory/1672-56-0x0000000075111000-0x0000000075113000-memory.dmp

          Filesize

          8KB