Analysis

  • max time kernel
    151s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 10:29

General

  • Target

    8edd5d0d38e1cbea27a8a68e48096d6bc016fe196b64b06e11038a1924055251.exe

  • Size

    180KB

  • MD5

    18acc7161d2e8570172cd4afed90d993

  • SHA1

    1f04a241faedcbcd5485edfdf50cb3586ce2d7e8

  • SHA256

    8edd5d0d38e1cbea27a8a68e48096d6bc016fe196b64b06e11038a1924055251

  • SHA512

    bfb9ccb059504db60941bbac3720db627b4a121dffdf89415ed5dc7f848d768da8f39ca97808294f675a018242ad80475a477dc06879f6ce946adfd34239af8c

  • SSDEEP

    3072:Miu7ehhNrWlAIJqPYNbihKovbAM4VkRvjCKuz3EwBT3edZlSL6aOuTOunpE7bVG/:M5uhNrWlAIJqPYNbihRzrNvjITEeedZo

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8edd5d0d38e1cbea27a8a68e48096d6bc016fe196b64b06e11038a1924055251.exe
    "C:\Users\Admin\AppData\Local\Temp\8edd5d0d38e1cbea27a8a68e48096d6bc016fe196b64b06e11038a1924055251.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\juioqa.exe
      "C:\Users\Admin\juioqa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\juioqa.exe

    Filesize

    180KB

    MD5

    11c30b112bb1908887f4ae4504d43305

    SHA1

    7273bbdefb9b519f372dbd9d07e39c0b468415e1

    SHA256

    aed4834a7dc901cbb73ba12d97d82e99c5e232197047906c9f940884598fe6b2

    SHA512

    16a73a4d0cd1079a15302df606184febb2da4dbc764d9d1ad2d74114713f9d3602729b34183cb7b8d2d79f26c8b14ec379e106f3cf7b9e7f310f49edd1e3409b

  • C:\Users\Admin\juioqa.exe

    Filesize

    180KB

    MD5

    11c30b112bb1908887f4ae4504d43305

    SHA1

    7273bbdefb9b519f372dbd9d07e39c0b468415e1

    SHA256

    aed4834a7dc901cbb73ba12d97d82e99c5e232197047906c9f940884598fe6b2

    SHA512

    16a73a4d0cd1079a15302df606184febb2da4dbc764d9d1ad2d74114713f9d3602729b34183cb7b8d2d79f26c8b14ec379e106f3cf7b9e7f310f49edd1e3409b

  • \Users\Admin\juioqa.exe

    Filesize

    180KB

    MD5

    11c30b112bb1908887f4ae4504d43305

    SHA1

    7273bbdefb9b519f372dbd9d07e39c0b468415e1

    SHA256

    aed4834a7dc901cbb73ba12d97d82e99c5e232197047906c9f940884598fe6b2

    SHA512

    16a73a4d0cd1079a15302df606184febb2da4dbc764d9d1ad2d74114713f9d3602729b34183cb7b8d2d79f26c8b14ec379e106f3cf7b9e7f310f49edd1e3409b

  • \Users\Admin\juioqa.exe

    Filesize

    180KB

    MD5

    11c30b112bb1908887f4ae4504d43305

    SHA1

    7273bbdefb9b519f372dbd9d07e39c0b468415e1

    SHA256

    aed4834a7dc901cbb73ba12d97d82e99c5e232197047906c9f940884598fe6b2

    SHA512

    16a73a4d0cd1079a15302df606184febb2da4dbc764d9d1ad2d74114713f9d3602729b34183cb7b8d2d79f26c8b14ec379e106f3cf7b9e7f310f49edd1e3409b

  • memory/1632-56-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB