Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 10:57

General

  • Target

    8008adcf684ec024746b220458cd3f7f6538228b9b52a6194527fd7b42a1ec85.exe

  • Size

    148KB

  • MD5

    ac467958a4e9293138985ea4f3f5242c

  • SHA1

    0d5cd02e0b627e6be64eb3209306b3b3f822d493

  • SHA256

    8008adcf684ec024746b220458cd3f7f6538228b9b52a6194527fd7b42a1ec85

  • SHA512

    122f81d2689562f69604801884cf3f4950fb6253234c82f896402bd908db1c808db137706de01d29d58907bdee77454bb1acac00be522af96f5c5e9666e426e6

  • SSDEEP

    3072:R45BVnzPVigj6G7gW1lktdVbKPkKE9qKIuD4oQZiEt60:gBVz9Fj7b1eDvXIoWV

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8008adcf684ec024746b220458cd3f7f6538228b9b52a6194527fd7b42a1ec85.exe
    "C:\Users\Admin\AppData\Local\Temp\8008adcf684ec024746b220458cd3f7f6538228b9b52a6194527fd7b42a1ec85.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Users\Admin\cvvaux.exe
      "C:\Users\Admin\cvvaux.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\cvvaux.exe

    Filesize

    148KB

    MD5

    b923ab040de31f8ffe8b0ef5cffd1dbe

    SHA1

    8aaf4e27a0ef3ea757a3a60fcfbccc04948c7cd7

    SHA256

    441b1cc8ff06a464275e878a5524beb16f5f1c660724fb83121a7c80a8b944b3

    SHA512

    62ebdf971ca25fe3b66029ce7904e09e28773a10236a56a8581d05c46f7b939b27925b188d64928d80f1de5780d04e56cea957c2af64dd921ca369b984363987

  • C:\Users\Admin\cvvaux.exe

    Filesize

    148KB

    MD5

    b923ab040de31f8ffe8b0ef5cffd1dbe

    SHA1

    8aaf4e27a0ef3ea757a3a60fcfbccc04948c7cd7

    SHA256

    441b1cc8ff06a464275e878a5524beb16f5f1c660724fb83121a7c80a8b944b3

    SHA512

    62ebdf971ca25fe3b66029ce7904e09e28773a10236a56a8581d05c46f7b939b27925b188d64928d80f1de5780d04e56cea957c2af64dd921ca369b984363987

  • \Users\Admin\cvvaux.exe

    Filesize

    148KB

    MD5

    b923ab040de31f8ffe8b0ef5cffd1dbe

    SHA1

    8aaf4e27a0ef3ea757a3a60fcfbccc04948c7cd7

    SHA256

    441b1cc8ff06a464275e878a5524beb16f5f1c660724fb83121a7c80a8b944b3

    SHA512

    62ebdf971ca25fe3b66029ce7904e09e28773a10236a56a8581d05c46f7b939b27925b188d64928d80f1de5780d04e56cea957c2af64dd921ca369b984363987

  • \Users\Admin\cvvaux.exe

    Filesize

    148KB

    MD5

    b923ab040de31f8ffe8b0ef5cffd1dbe

    SHA1

    8aaf4e27a0ef3ea757a3a60fcfbccc04948c7cd7

    SHA256

    441b1cc8ff06a464275e878a5524beb16f5f1c660724fb83121a7c80a8b944b3

    SHA512

    62ebdf971ca25fe3b66029ce7904e09e28773a10236a56a8581d05c46f7b939b27925b188d64928d80f1de5780d04e56cea957c2af64dd921ca369b984363987

  • memory/740-56-0x0000000075A81000-0x0000000075A83000-memory.dmp

    Filesize

    8KB

  • memory/1924-59-0x0000000000000000-mapping.dmp