Analysis

  • max time kernel
    173s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 10:19

General

  • Target

    14b7084d108ce0d2ce5c83e9696bae2a2a4ab24fb67c42b991d9a96a700478b7.exe

  • Size

    340KB

  • MD5

    066c0dd206a70c628ac16b82f352fb14

  • SHA1

    b77b34a613fe507e7407556c98cbf3cb679b9c4f

  • SHA256

    14b7084d108ce0d2ce5c83e9696bae2a2a4ab24fb67c42b991d9a96a700478b7

  • SHA512

    2d00d015b295376fd592f4798ddd4d420101782ca4349eb8e93771ed6aa91a6f88acb232901410d4532d3f88ab21da7cb87b66b11e4c871af55bd84a127faf68

  • SSDEEP

    6144:7FmR9SLkWor+akVC5s/durgm7hv8htqiXkIvaX/m7bfTWaUspmHjYT9oFv6wHH/M:x89SLkWor+akVC5s/dIdEhtqiXkIvaXo

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14b7084d108ce0d2ce5c83e9696bae2a2a4ab24fb67c42b991d9a96a700478b7.exe
    "C:\Users\Admin\AppData\Local\Temp\14b7084d108ce0d2ce5c83e9696bae2a2a4ab24fb67c42b991d9a96a700478b7.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:608
    • C:\Users\Admin\houtal.exe
      "C:\Users\Admin\houtal.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1124

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\houtal.exe

    Filesize

    340KB

    MD5

    204d529fff3d3d8cfbc9bdebad34ddf4

    SHA1

    f99796e178aac3cc478f3b992eb90013f03b096d

    SHA256

    a7f4617a6d9de33a73d9d9f57f66c3808b2b69fbf856139e8467953130bd3cb6

    SHA512

    630a8d2fa53bba6dfd04e3b61a96be0288f9b4558cb27d5a4694d4e8299a26a67d58737b19b1ae7ee581323936d01653f81b19c7d6724fa55b4759e42bb4e6b7

  • C:\Users\Admin\houtal.exe

    Filesize

    340KB

    MD5

    204d529fff3d3d8cfbc9bdebad34ddf4

    SHA1

    f99796e178aac3cc478f3b992eb90013f03b096d

    SHA256

    a7f4617a6d9de33a73d9d9f57f66c3808b2b69fbf856139e8467953130bd3cb6

    SHA512

    630a8d2fa53bba6dfd04e3b61a96be0288f9b4558cb27d5a4694d4e8299a26a67d58737b19b1ae7ee581323936d01653f81b19c7d6724fa55b4759e42bb4e6b7

  • \Users\Admin\houtal.exe

    Filesize

    340KB

    MD5

    204d529fff3d3d8cfbc9bdebad34ddf4

    SHA1

    f99796e178aac3cc478f3b992eb90013f03b096d

    SHA256

    a7f4617a6d9de33a73d9d9f57f66c3808b2b69fbf856139e8467953130bd3cb6

    SHA512

    630a8d2fa53bba6dfd04e3b61a96be0288f9b4558cb27d5a4694d4e8299a26a67d58737b19b1ae7ee581323936d01653f81b19c7d6724fa55b4759e42bb4e6b7

  • \Users\Admin\houtal.exe

    Filesize

    340KB

    MD5

    204d529fff3d3d8cfbc9bdebad34ddf4

    SHA1

    f99796e178aac3cc478f3b992eb90013f03b096d

    SHA256

    a7f4617a6d9de33a73d9d9f57f66c3808b2b69fbf856139e8467953130bd3cb6

    SHA512

    630a8d2fa53bba6dfd04e3b61a96be0288f9b4558cb27d5a4694d4e8299a26a67d58737b19b1ae7ee581323936d01653f81b19c7d6724fa55b4759e42bb4e6b7

  • memory/608-54-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/608-57-0x0000000075811000-0x0000000075813000-memory.dmp

    Filesize

    8KB

  • memory/608-65-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/608-66-0x0000000002DE0000-0x0000000002E38000-memory.dmp

    Filesize

    352KB

  • memory/608-69-0x0000000002DE0000-0x0000000002E38000-memory.dmp

    Filesize

    352KB

  • memory/1124-60-0x0000000000000000-mapping.dmp

  • memory/1124-67-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1124-70-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB