Analysis

  • max time kernel
    151s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 10:17

General

  • Target

    aee9b9fe25d973aa43dec74c77e6cbd5f7ab51cff5ed94cd05a3c5ee7734a735.exe

  • Size

    168KB

  • MD5

    52d80b98458f014c7752f727ed789b4d

  • SHA1

    7460d626c5abd8a249721fb4d1895a4eb6a55347

  • SHA256

    aee9b9fe25d973aa43dec74c77e6cbd5f7ab51cff5ed94cd05a3c5ee7734a735

  • SHA512

    ce25e6d4ea1d609e4044ec8b6cc0464b4dc3890fa86227c41d7091600f137480a123ed3d35a14824718180fd4eb6fe1f89f6656aec066afd9052caf655fbfd24

  • SSDEEP

    1536:wuXJrEys7cv+cGgBtKH67bU8TkWRifJYwdtmP+7m5KFbwQL4AW3lV4ckUl0OEZCf:9BR+cGgB4ZCchor5KFjkF/5YC6qJnnrr

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aee9b9fe25d973aa43dec74c77e6cbd5f7ab51cff5ed94cd05a3c5ee7734a735.exe
    "C:\Users\Admin\AppData\Local\Temp\aee9b9fe25d973aa43dec74c77e6cbd5f7ab51cff5ed94cd05a3c5ee7734a735.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Users\Admin\toima.exe
      "C:\Users\Admin\toima.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\toima.exe

    Filesize

    168KB

    MD5

    9b04d244755dc95f7951cbb20015bcc1

    SHA1

    f1b14d3908ada3d673ba8025b45021556f72f086

    SHA256

    aab546c2556a14a271aaaf278439d3bef0c299abbda7ffa5352aae725e259de6

    SHA512

    cbaa2b9f2e1257cc4ff5cd260cf4df8b8914d5280f194104ba35e0aa08d15070cba73d0996fafc0110ab4eb2f3bbe14bf5e4b42e2eac9a951d2316458856c8f6

  • C:\Users\Admin\toima.exe

    Filesize

    168KB

    MD5

    9b04d244755dc95f7951cbb20015bcc1

    SHA1

    f1b14d3908ada3d673ba8025b45021556f72f086

    SHA256

    aab546c2556a14a271aaaf278439d3bef0c299abbda7ffa5352aae725e259de6

    SHA512

    cbaa2b9f2e1257cc4ff5cd260cf4df8b8914d5280f194104ba35e0aa08d15070cba73d0996fafc0110ab4eb2f3bbe14bf5e4b42e2eac9a951d2316458856c8f6

  • \Users\Admin\toima.exe

    Filesize

    168KB

    MD5

    9b04d244755dc95f7951cbb20015bcc1

    SHA1

    f1b14d3908ada3d673ba8025b45021556f72f086

    SHA256

    aab546c2556a14a271aaaf278439d3bef0c299abbda7ffa5352aae725e259de6

    SHA512

    cbaa2b9f2e1257cc4ff5cd260cf4df8b8914d5280f194104ba35e0aa08d15070cba73d0996fafc0110ab4eb2f3bbe14bf5e4b42e2eac9a951d2316458856c8f6

  • \Users\Admin\toima.exe

    Filesize

    168KB

    MD5

    9b04d244755dc95f7951cbb20015bcc1

    SHA1

    f1b14d3908ada3d673ba8025b45021556f72f086

    SHA256

    aab546c2556a14a271aaaf278439d3bef0c299abbda7ffa5352aae725e259de6

    SHA512

    cbaa2b9f2e1257cc4ff5cd260cf4df8b8914d5280f194104ba35e0aa08d15070cba73d0996fafc0110ab4eb2f3bbe14bf5e4b42e2eac9a951d2316458856c8f6

  • memory/1776-54-0x0000000075F01000-0x0000000075F03000-memory.dmp

    Filesize

    8KB