Analysis

  • max time kernel
    151s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 20:02

General

  • Target

    eddc7dddbee9155d07fb9603068971f1c2d2f13aaa72ac64dac7f8d735ff2466.exe

  • Size

    80KB

  • MD5

    cf8c701314ef1bf2043cb74eb4263c95

  • SHA1

    4bfc2826915e2c48329ed5358f98f6c3d976988c

  • SHA256

    eddc7dddbee9155d07fb9603068971f1c2d2f13aaa72ac64dac7f8d735ff2466

  • SHA512

    452b83f16427ecb8975dcc1b3156fbcdacfdba36ad68c0083371bb19cfaec1ddaecb7e7e03ab471e875b5e082527a589cf9e4a33f2c7828bd1dd5e07fd31d146

  • SSDEEP

    1536:vv7wLRUvKGlTGQxguIxZTAwlpwFJ0T72mocT:noSvrKxZfUFJ0T72mBT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eddc7dddbee9155d07fb9603068971f1c2d2f13aaa72ac64dac7f8d735ff2466.exe
    "C:\Users\Admin\AppData\Local\Temp\eddc7dddbee9155d07fb9603068971f1c2d2f13aaa72ac64dac7f8d735ff2466.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Users\Admin\peazul.exe
      "C:\Users\Admin\peazul.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\peazul.exe

    Filesize

    80KB

    MD5

    b05eae7c777ae5bab091010c28153e00

    SHA1

    eb8f68c96057aa3cc293fe6acdc0e902bf1c97ed

    SHA256

    826fbd16b73cc155e8a5a1da568c135f7937da283c0c5966e6ecaf35dd7c2947

    SHA512

    e4f1a76825d7efad8bb395489801ad06da585ff947abf154fc974ed46dfe0481fc87922e7580fc67d383c85189daabdff5f1ada207a6f505bbabada4b359cc82

  • C:\Users\Admin\peazul.exe

    Filesize

    80KB

    MD5

    b05eae7c777ae5bab091010c28153e00

    SHA1

    eb8f68c96057aa3cc293fe6acdc0e902bf1c97ed

    SHA256

    826fbd16b73cc155e8a5a1da568c135f7937da283c0c5966e6ecaf35dd7c2947

    SHA512

    e4f1a76825d7efad8bb395489801ad06da585ff947abf154fc974ed46dfe0481fc87922e7580fc67d383c85189daabdff5f1ada207a6f505bbabada4b359cc82

  • \Users\Admin\peazul.exe

    Filesize

    80KB

    MD5

    b05eae7c777ae5bab091010c28153e00

    SHA1

    eb8f68c96057aa3cc293fe6acdc0e902bf1c97ed

    SHA256

    826fbd16b73cc155e8a5a1da568c135f7937da283c0c5966e6ecaf35dd7c2947

    SHA512

    e4f1a76825d7efad8bb395489801ad06da585ff947abf154fc974ed46dfe0481fc87922e7580fc67d383c85189daabdff5f1ada207a6f505bbabada4b359cc82

  • \Users\Admin\peazul.exe

    Filesize

    80KB

    MD5

    b05eae7c777ae5bab091010c28153e00

    SHA1

    eb8f68c96057aa3cc293fe6acdc0e902bf1c97ed

    SHA256

    826fbd16b73cc155e8a5a1da568c135f7937da283c0c5966e6ecaf35dd7c2947

    SHA512

    e4f1a76825d7efad8bb395489801ad06da585ff947abf154fc974ed46dfe0481fc87922e7580fc67d383c85189daabdff5f1ada207a6f505bbabada4b359cc82

  • memory/916-56-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB