Analysis

  • max time kernel
    151s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 09:55

General

  • Target

    5dc2a729f28a21c8a8c83937c5f2c47b2b2f94c92509728c49615b06fbc4831a.exe

  • Size

    300KB

  • MD5

    b316070a7bcd304a80f853ce14d8a982

  • SHA1

    fb498a3b05adf7a1c47da3b581c1ea62ee830613

  • SHA256

    5dc2a729f28a21c8a8c83937c5f2c47b2b2f94c92509728c49615b06fbc4831a

  • SHA512

    d8cfd40bed2724db0cd46e14cdd0a6f9ee9e182fc273fcf8947daf6de37fd1d45bdd4e753245d8fbd2daab4f526b488517832c9ae9aa796784378915497e57a6

  • SSDEEP

    6144:mFdCMeavuzakX681UbgwDO7zRdmM57M186AFGt:mbBvuzzEt

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dc2a729f28a21c8a8c83937c5f2c47b2b2f94c92509728c49615b06fbc4831a.exe
    "C:\Users\Admin\AppData\Local\Temp\5dc2a729f28a21c8a8c83937c5f2c47b2b2f94c92509728c49615b06fbc4831a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\guaox.exe
      "C:\Users\Admin\guaox.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\guaox.exe

    Filesize

    300KB

    MD5

    1ad4849c80f2c39283d94197f2f4a386

    SHA1

    683604e0467ed7c07bb92d01373979225cdc1325

    SHA256

    1ad20a5b085121997990e794a59d8735c9f88b6386c9be01e0c360dd0090a53d

    SHA512

    f63ad61f4df7ec118758ce71def0ef7a25b1c652a4fa6ce6d498f6bbe984fb3c6b8860e08dfee3690396377dc31eefcb7b276c37ee9cdbf2fc0a52d8fcf2344d

  • C:\Users\Admin\guaox.exe

    Filesize

    300KB

    MD5

    1ad4849c80f2c39283d94197f2f4a386

    SHA1

    683604e0467ed7c07bb92d01373979225cdc1325

    SHA256

    1ad20a5b085121997990e794a59d8735c9f88b6386c9be01e0c360dd0090a53d

    SHA512

    f63ad61f4df7ec118758ce71def0ef7a25b1c652a4fa6ce6d498f6bbe984fb3c6b8860e08dfee3690396377dc31eefcb7b276c37ee9cdbf2fc0a52d8fcf2344d

  • \Users\Admin\guaox.exe

    Filesize

    300KB

    MD5

    1ad4849c80f2c39283d94197f2f4a386

    SHA1

    683604e0467ed7c07bb92d01373979225cdc1325

    SHA256

    1ad20a5b085121997990e794a59d8735c9f88b6386c9be01e0c360dd0090a53d

    SHA512

    f63ad61f4df7ec118758ce71def0ef7a25b1c652a4fa6ce6d498f6bbe984fb3c6b8860e08dfee3690396377dc31eefcb7b276c37ee9cdbf2fc0a52d8fcf2344d

  • \Users\Admin\guaox.exe

    Filesize

    300KB

    MD5

    1ad4849c80f2c39283d94197f2f4a386

    SHA1

    683604e0467ed7c07bb92d01373979225cdc1325

    SHA256

    1ad20a5b085121997990e794a59d8735c9f88b6386c9be01e0c360dd0090a53d

    SHA512

    f63ad61f4df7ec118758ce71def0ef7a25b1c652a4fa6ce6d498f6bbe984fb3c6b8860e08dfee3690396377dc31eefcb7b276c37ee9cdbf2fc0a52d8fcf2344d

  • memory/1632-56-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB