Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 10:26

General

  • Target

    a8346088ee496c256e80cdc282778afbd3bc82db1fe948c47826cef6517308ae.exe

  • Size

    176KB

  • MD5

    b76cac9d958932bdaf20cf6b05fd0730

  • SHA1

    de9be37d806d2ee03ed279bc5495c4df84c81b71

  • SHA256

    a8346088ee496c256e80cdc282778afbd3bc82db1fe948c47826cef6517308ae

  • SHA512

    bb22fb461dcc788e994304874197b7ea4887855710869252fbc4b7d1c020fe474990d952887ca9519588f09ef5fb9ca0e0c820f2557111fb03165a358766d5d2

  • SSDEEP

    3072:R004IcfpHlp1D2KcwjIU2aTObcpT/pHkEAbN/yK/fObT/bGiCV/COqoSQGiBuAZL:C04PfpHlp1KKcwjIDaTObcZ/pHkMK/fL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8346088ee496c256e80cdc282778afbd3bc82db1fe948c47826cef6517308ae.exe
    "C:\Users\Admin\AppData\Local\Temp\a8346088ee496c256e80cdc282778afbd3bc82db1fe948c47826cef6517308ae.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\xeuac.exe
      "C:\Users\Admin\xeuac.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xeuac.exe

    Filesize

    176KB

    MD5

    e35714c5a98a6a7622156bada3b95387

    SHA1

    057e8962e34665002b4109d8f87a21a07cfe4d85

    SHA256

    5c90dbd48ca47ffc342af7d6f5c0287e7e87808bf6714c5f8b39c1b9dff71906

    SHA512

    4af57da4296559fe7840b168a8bdd8ed1abd98edcefc2fb1af58c98e26c4b1f51a4f2bf8f2a6ba72c185b9d4699c3ca25c6e81f7f0f2b8e7e1ab2c0a75eca1dc

  • C:\Users\Admin\xeuac.exe

    Filesize

    176KB

    MD5

    e35714c5a98a6a7622156bada3b95387

    SHA1

    057e8962e34665002b4109d8f87a21a07cfe4d85

    SHA256

    5c90dbd48ca47ffc342af7d6f5c0287e7e87808bf6714c5f8b39c1b9dff71906

    SHA512

    4af57da4296559fe7840b168a8bdd8ed1abd98edcefc2fb1af58c98e26c4b1f51a4f2bf8f2a6ba72c185b9d4699c3ca25c6e81f7f0f2b8e7e1ab2c0a75eca1dc

  • \Users\Admin\xeuac.exe

    Filesize

    176KB

    MD5

    e35714c5a98a6a7622156bada3b95387

    SHA1

    057e8962e34665002b4109d8f87a21a07cfe4d85

    SHA256

    5c90dbd48ca47ffc342af7d6f5c0287e7e87808bf6714c5f8b39c1b9dff71906

    SHA512

    4af57da4296559fe7840b168a8bdd8ed1abd98edcefc2fb1af58c98e26c4b1f51a4f2bf8f2a6ba72c185b9d4699c3ca25c6e81f7f0f2b8e7e1ab2c0a75eca1dc

  • \Users\Admin\xeuac.exe

    Filesize

    176KB

    MD5

    e35714c5a98a6a7622156bada3b95387

    SHA1

    057e8962e34665002b4109d8f87a21a07cfe4d85

    SHA256

    5c90dbd48ca47ffc342af7d6f5c0287e7e87808bf6714c5f8b39c1b9dff71906

    SHA512

    4af57da4296559fe7840b168a8bdd8ed1abd98edcefc2fb1af58c98e26c4b1f51a4f2bf8f2a6ba72c185b9d4699c3ca25c6e81f7f0f2b8e7e1ab2c0a75eca1dc

  • memory/1752-56-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB