Analysis

  • max time kernel
    151s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 09:20

General

  • Target

    cbad0679fc6a6f63723560095372ed68eb0522b424456a6d4342c167ae04c896.exe

  • Size

    152KB

  • MD5

    dcc08a1d81f0976491d34427f0eb5824

  • SHA1

    fea5854bdf0fed102f32d2197f0fafc65867c9a9

  • SHA256

    cbad0679fc6a6f63723560095372ed68eb0522b424456a6d4342c167ae04c896

  • SHA512

    fc3bd3c45f93b297b0bff309ddfe07584e13995f3bb1145ff448fe42ceee0fa6850488abf301b1edc1358d1a47ea20942a72c34857ee3673899381fbcbdbac91

  • SSDEEP

    3072:QmlcPTYhjIu+7MxJUbaxI3zQyzLBuT+u3:j+7Mxa0yzE

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbad0679fc6a6f63723560095372ed68eb0522b424456a6d4342c167ae04c896.exe
    "C:\Users\Admin\AppData\Local\Temp\cbad0679fc6a6f63723560095372ed68eb0522b424456a6d4342c167ae04c896.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\xeuqup.exe
      "C:\Users\Admin\xeuqup.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1472

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xeuqup.exe

    Filesize

    152KB

    MD5

    3ae95990be7e136d806a84dc667bcbfe

    SHA1

    923884f231818b2f5f16d1664bf8fdc2eab6e88f

    SHA256

    25197d546deb14eec4713da24f280409134f15be7bf938cb8fe86a3536ac8d07

    SHA512

    63b5cf52935ee5efcfcbc3b5d6032ed0a76d4004ed15b67b339a9cd97f78b0807c8ddacbcc2024b948d670abc06d7f45e8627f464b57c1274e71b38bfc939e8f

  • C:\Users\Admin\xeuqup.exe

    Filesize

    152KB

    MD5

    3ae95990be7e136d806a84dc667bcbfe

    SHA1

    923884f231818b2f5f16d1664bf8fdc2eab6e88f

    SHA256

    25197d546deb14eec4713da24f280409134f15be7bf938cb8fe86a3536ac8d07

    SHA512

    63b5cf52935ee5efcfcbc3b5d6032ed0a76d4004ed15b67b339a9cd97f78b0807c8ddacbcc2024b948d670abc06d7f45e8627f464b57c1274e71b38bfc939e8f

  • \Users\Admin\xeuqup.exe

    Filesize

    152KB

    MD5

    3ae95990be7e136d806a84dc667bcbfe

    SHA1

    923884f231818b2f5f16d1664bf8fdc2eab6e88f

    SHA256

    25197d546deb14eec4713da24f280409134f15be7bf938cb8fe86a3536ac8d07

    SHA512

    63b5cf52935ee5efcfcbc3b5d6032ed0a76d4004ed15b67b339a9cd97f78b0807c8ddacbcc2024b948d670abc06d7f45e8627f464b57c1274e71b38bfc939e8f

  • \Users\Admin\xeuqup.exe

    Filesize

    152KB

    MD5

    3ae95990be7e136d806a84dc667bcbfe

    SHA1

    923884f231818b2f5f16d1664bf8fdc2eab6e88f

    SHA256

    25197d546deb14eec4713da24f280409134f15be7bf938cb8fe86a3536ac8d07

    SHA512

    63b5cf52935ee5efcfcbc3b5d6032ed0a76d4004ed15b67b339a9cd97f78b0807c8ddacbcc2024b948d670abc06d7f45e8627f464b57c1274e71b38bfc939e8f

  • memory/1948-56-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

    Filesize

    8KB