Analysis

  • max time kernel
    151s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 10:17

General

  • Target

    84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe

  • Size

    250KB

  • MD5

    5a9bec35a02014351821721db1c1d6a6

  • SHA1

    9516cc7c3ca8ebd4a5933d6766eb798987374604

  • SHA256

    84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385

  • SHA512

    d15072932274d20434305b3b30c4e317f3dc99dc40a51f73c9c0490f1b4b0992f210e1c87b866ee142c96892c42bafef5f17a1978eb82f645b0e9bdf3c4722ca

  • SSDEEP

    6144:hrafL38i7BQKtxmvgs3alEUUai/NlV8stHI8s7mGgVsZNoz06FHb/OvX3GQ+GSAw:hruMSQKtxmvZ30EUUaiVlV8s906FHb/X

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 42 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe
    "C:\Users\Admin\AppData\Local\Temp\84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\xpqaaq.exe
      "C:\Users\Admin\xpqaaq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xpqaaq.exe

    Filesize

    252KB

    MD5

    6469fb0bfc4a1bdbaef3a7828cd6a3da

    SHA1

    48e8f5df5d413fc0af017ec07f142d4904bf9282

    SHA256

    ce93d81314b45457e2731a17e606f0c82f39bb790b299709d182fbfd2cc2c62c

    SHA512

    bd9d0e85f009b9ed8b064709d090301520838009a8de6ba9043f095366d9fdc386385b4d46b7700c0959ce0b1283a0d1cbc294ec5216103f94137e5748e10350

  • C:\Users\Admin\xpqaaq.exe

    Filesize

    252KB

    MD5

    6469fb0bfc4a1bdbaef3a7828cd6a3da

    SHA1

    48e8f5df5d413fc0af017ec07f142d4904bf9282

    SHA256

    ce93d81314b45457e2731a17e606f0c82f39bb790b299709d182fbfd2cc2c62c

    SHA512

    bd9d0e85f009b9ed8b064709d090301520838009a8de6ba9043f095366d9fdc386385b4d46b7700c0959ce0b1283a0d1cbc294ec5216103f94137e5748e10350

  • \Users\Admin\xpqaaq.exe

    Filesize

    252KB

    MD5

    6469fb0bfc4a1bdbaef3a7828cd6a3da

    SHA1

    48e8f5df5d413fc0af017ec07f142d4904bf9282

    SHA256

    ce93d81314b45457e2731a17e606f0c82f39bb790b299709d182fbfd2cc2c62c

    SHA512

    bd9d0e85f009b9ed8b064709d090301520838009a8de6ba9043f095366d9fdc386385b4d46b7700c0959ce0b1283a0d1cbc294ec5216103f94137e5748e10350

  • \Users\Admin\xpqaaq.exe

    Filesize

    252KB

    MD5

    6469fb0bfc4a1bdbaef3a7828cd6a3da

    SHA1

    48e8f5df5d413fc0af017ec07f142d4904bf9282

    SHA256

    ce93d81314b45457e2731a17e606f0c82f39bb790b299709d182fbfd2cc2c62c

    SHA512

    bd9d0e85f009b9ed8b064709d090301520838009a8de6ba9043f095366d9fdc386385b4d46b7700c0959ce0b1283a0d1cbc294ec5216103f94137e5748e10350

  • memory/1188-56-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

    Filesize

    8KB