Analysis

  • max time kernel
    151s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 10:13

General

  • Target

    aa4968b5d043cd5cc074faa66ba717d75df8e9708de1591ecf2dd617600732e2.exe

  • Size

    164KB

  • MD5

    432cf3a230d204b61393dd670f9747bf

  • SHA1

    11e1d3978e2fe41d6cb51857f79043b6ef01838b

  • SHA256

    aa4968b5d043cd5cc074faa66ba717d75df8e9708de1591ecf2dd617600732e2

  • SHA512

    183adebb2675fb5dbfec15412e2a73d625218f22b31318a722970e85cef05b607b094a3d026eb083d9b8df8aa7318455905597d89aceed8d3989a8ec5c522a52

  • SSDEEP

    3072:77Vz57EbV93WZy844f6G06r7bkcsN2bnldN:77cbOQof6Gn7bkjKld

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa4968b5d043cd5cc074faa66ba717d75df8e9708de1591ecf2dd617600732e2.exe
    "C:\Users\Admin\AppData\Local\Temp\aa4968b5d043cd5cc074faa66ba717d75df8e9708de1591ecf2dd617600732e2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\wiuafe.exe
      "C:\Users\Admin\wiuafe.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wiuafe.exe

    Filesize

    164KB

    MD5

    f5b3e8ffa72f7ecef9bdf0ecfa0de825

    SHA1

    5eff9ad5092d842ef275f63cf4e0354d23c81cdb

    SHA256

    ef9670bcecd4ac4b5d922cdcbdeaf23da15bd8b0fda7bf21b6abd7faa2b815b6

    SHA512

    b5466314a0679a0f2798a446b193a6c6246b8bb6837ba09d6e479845b8ba71d483dd7c59a67e9ea62b8ce265d6220d623d2e085ed00eae783c9f5212ea2f6253

  • C:\Users\Admin\wiuafe.exe

    Filesize

    164KB

    MD5

    f5b3e8ffa72f7ecef9bdf0ecfa0de825

    SHA1

    5eff9ad5092d842ef275f63cf4e0354d23c81cdb

    SHA256

    ef9670bcecd4ac4b5d922cdcbdeaf23da15bd8b0fda7bf21b6abd7faa2b815b6

    SHA512

    b5466314a0679a0f2798a446b193a6c6246b8bb6837ba09d6e479845b8ba71d483dd7c59a67e9ea62b8ce265d6220d623d2e085ed00eae783c9f5212ea2f6253

  • \Users\Admin\wiuafe.exe

    Filesize

    164KB

    MD5

    f5b3e8ffa72f7ecef9bdf0ecfa0de825

    SHA1

    5eff9ad5092d842ef275f63cf4e0354d23c81cdb

    SHA256

    ef9670bcecd4ac4b5d922cdcbdeaf23da15bd8b0fda7bf21b6abd7faa2b815b6

    SHA512

    b5466314a0679a0f2798a446b193a6c6246b8bb6837ba09d6e479845b8ba71d483dd7c59a67e9ea62b8ce265d6220d623d2e085ed00eae783c9f5212ea2f6253

  • \Users\Admin\wiuafe.exe

    Filesize

    164KB

    MD5

    f5b3e8ffa72f7ecef9bdf0ecfa0de825

    SHA1

    5eff9ad5092d842ef275f63cf4e0354d23c81cdb

    SHA256

    ef9670bcecd4ac4b5d922cdcbdeaf23da15bd8b0fda7bf21b6abd7faa2b815b6

    SHA512

    b5466314a0679a0f2798a446b193a6c6246b8bb6837ba09d6e479845b8ba71d483dd7c59a67e9ea62b8ce265d6220d623d2e085ed00eae783c9f5212ea2f6253

  • memory/1228-56-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB