Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 10:38

General

  • Target

    dffaf281dd222bb879938f5d9d350fec7a44ee103f7270af30e41bb1d6b237f7.exe

  • Size

    84KB

  • MD5

    325716811f53075a13fac48eee857f84

  • SHA1

    a92abdbceaec24a6139cced1d385caea904ee20a

  • SHA256

    dffaf281dd222bb879938f5d9d350fec7a44ee103f7270af30e41bb1d6b237f7

  • SHA512

    d6d32b306fe7670e9fcb8b254a2180b2c5236af8e9de446c10633f9851a02c5de5135de58c1e626bdd82d3869973087f4a588230de6f72e4651b54c6429df78f

  • SSDEEP

    1536:Dz8yZp47bg4htUVGLG/wXJYeUj27dTo13i6EmqSc:JpWUVeG/wXJY527ujc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dffaf281dd222bb879938f5d9d350fec7a44ee103f7270af30e41bb1d6b237f7.exe
    "C:\Users\Admin\AppData\Local\Temp\dffaf281dd222bb879938f5d9d350fec7a44ee103f7270af30e41bb1d6b237f7.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\taiefu.exe
      "C:\Users\Admin\taiefu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\taiefu.exe

    Filesize

    84KB

    MD5

    637ef997c84558a06e7dabc69531c20c

    SHA1

    27c35bd21eee03d9fc633d62116984418db9ba82

    SHA256

    fe62d927253d72c8ad1e8fafd32a40caded808be237d0ad7244f12b1d5ab8aaf

    SHA512

    9768f11beb8b7563e832573677a1bda44a80bd20974d2cd80b8a989e24b30e3671b2a6eb063e263bf08c856e7e51fa8374bacf0c85025b1d13ceefb722f7f10b

  • C:\Users\Admin\taiefu.exe

    Filesize

    84KB

    MD5

    637ef997c84558a06e7dabc69531c20c

    SHA1

    27c35bd21eee03d9fc633d62116984418db9ba82

    SHA256

    fe62d927253d72c8ad1e8fafd32a40caded808be237d0ad7244f12b1d5ab8aaf

    SHA512

    9768f11beb8b7563e832573677a1bda44a80bd20974d2cd80b8a989e24b30e3671b2a6eb063e263bf08c856e7e51fa8374bacf0c85025b1d13ceefb722f7f10b

  • \Users\Admin\taiefu.exe

    Filesize

    84KB

    MD5

    637ef997c84558a06e7dabc69531c20c

    SHA1

    27c35bd21eee03d9fc633d62116984418db9ba82

    SHA256

    fe62d927253d72c8ad1e8fafd32a40caded808be237d0ad7244f12b1d5ab8aaf

    SHA512

    9768f11beb8b7563e832573677a1bda44a80bd20974d2cd80b8a989e24b30e3671b2a6eb063e263bf08c856e7e51fa8374bacf0c85025b1d13ceefb722f7f10b

  • \Users\Admin\taiefu.exe

    Filesize

    84KB

    MD5

    637ef997c84558a06e7dabc69531c20c

    SHA1

    27c35bd21eee03d9fc633d62116984418db9ba82

    SHA256

    fe62d927253d72c8ad1e8fafd32a40caded808be237d0ad7244f12b1d5ab8aaf

    SHA512

    9768f11beb8b7563e832573677a1bda44a80bd20974d2cd80b8a989e24b30e3671b2a6eb063e263bf08c856e7e51fa8374bacf0c85025b1d13ceefb722f7f10b

  • memory/1192-59-0x0000000000000000-mapping.dmp

  • memory/1636-56-0x00000000762F1000-0x00000000762F3000-memory.dmp

    Filesize

    8KB