Analysis

  • max time kernel
    153s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 20:24

General

  • Target

    a90d0c09a3a7c6c93156fb96c53327fb974ceef500f77456f0761aec3ad2c5ba.exe

  • Size

    124KB

  • MD5

    4317f91218e9d6233d652e25ee953292

  • SHA1

    7b5fe4a11671e66f72d601325baca69b86d1eb25

  • SHA256

    a90d0c09a3a7c6c93156fb96c53327fb974ceef500f77456f0761aec3ad2c5ba

  • SHA512

    c608a1e4b4dbeb39ac635f2a7b43731d2768329a6e110856730e4fd1e53b03cd5fc21dbda44af75e6ad231793069ae9ccb01f45516965f02a9d4f63e1d25afbf

  • SSDEEP

    1536:rOtkjETQRHU0GgAJa0P1kNmKldCMhdu8KWP/nTn8nBP9VeMNeG0h/E:AkjjRHU0GgAT9gM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a90d0c09a3a7c6c93156fb96c53327fb974ceef500f77456f0761aec3ad2c5ba.exe
    "C:\Users\Admin\AppData\Local\Temp\a90d0c09a3a7c6c93156fb96c53327fb974ceef500f77456f0761aec3ad2c5ba.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Users\Admin\jooan.exe
      "C:\Users\Admin\jooan.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:604

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\jooan.exe

          Filesize

          124KB

          MD5

          e3c04d3fd12e5c88da3fb5f608284a78

          SHA1

          a4b8bc5f0fa8a3d0d7b1e195b93399f305b43036

          SHA256

          71685db7030273a3b2fc7440e0b988326e2b10d480fe79999361ef0d398dca90

          SHA512

          a4b78e85060053099ac3d752336b17e949f773d770ab9c960939e089b4ed98fad37cdb06b927a69c33fef8947cbaf83c6742cd0be37f977e6c77c79df9cf9617

        • C:\Users\Admin\jooan.exe

          Filesize

          124KB

          MD5

          e3c04d3fd12e5c88da3fb5f608284a78

          SHA1

          a4b8bc5f0fa8a3d0d7b1e195b93399f305b43036

          SHA256

          71685db7030273a3b2fc7440e0b988326e2b10d480fe79999361ef0d398dca90

          SHA512

          a4b78e85060053099ac3d752336b17e949f773d770ab9c960939e089b4ed98fad37cdb06b927a69c33fef8947cbaf83c6742cd0be37f977e6c77c79df9cf9617

        • \Users\Admin\jooan.exe

          Filesize

          124KB

          MD5

          e3c04d3fd12e5c88da3fb5f608284a78

          SHA1

          a4b8bc5f0fa8a3d0d7b1e195b93399f305b43036

          SHA256

          71685db7030273a3b2fc7440e0b988326e2b10d480fe79999361ef0d398dca90

          SHA512

          a4b78e85060053099ac3d752336b17e949f773d770ab9c960939e089b4ed98fad37cdb06b927a69c33fef8947cbaf83c6742cd0be37f977e6c77c79df9cf9617

        • \Users\Admin\jooan.exe

          Filesize

          124KB

          MD5

          e3c04d3fd12e5c88da3fb5f608284a78

          SHA1

          a4b8bc5f0fa8a3d0d7b1e195b93399f305b43036

          SHA256

          71685db7030273a3b2fc7440e0b988326e2b10d480fe79999361ef0d398dca90

          SHA512

          a4b78e85060053099ac3d752336b17e949f773d770ab9c960939e089b4ed98fad37cdb06b927a69c33fef8947cbaf83c6742cd0be37f977e6c77c79df9cf9617

        • memory/896-56-0x0000000076411000-0x0000000076413000-memory.dmp

          Filesize

          8KB