Analysis

  • max time kernel
    186s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 11:41

General

  • Target

    a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe

  • Size

    100KB

  • MD5

    0a0105487e5149f5db89e3e78f8cb9a0

  • SHA1

    345b796777af8c646eb906efe8e4257eb699c70e

  • SHA256

    a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a

  • SHA512

    2282b4615652239b64227ef7c1b6b117b2396225e328af32cf5b11ebebda39d98d843d363deab9b1503bcb598ef90e95d4956ea80a64f5fba1df975e1d70c551

  • SSDEEP

    1536:8+tGC82NTzwNpMGAc4ohrPXo+73Rez8b0SyKNIjnZrJ:5wNwurPX7CKCnlJ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe
    "C:\Users\Admin\AppData\Local\Temp\a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\vdvev.exe
      "C:\Users\Admin\vdvev.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vdvev.exe

    Filesize

    100KB

    MD5

    995f74601dd77657ac67a28bec2a091b

    SHA1

    c0a44a33d3a1786b0707c653b634c929708c2de2

    SHA256

    57de72feedf6806f4f8eac808ed4203ab9c05d6743a1ced8e3ca7cc651688dc6

    SHA512

    4bf432360541d331538630edb06904412aa2a4ead8393062d79ffd5e66cbf9689b6ff0c5ec0bc06ae57ec09ab2d6cc7601c630c9f9bc0225991e58840816a2d0

  • C:\Users\Admin\vdvev.exe

    Filesize

    100KB

    MD5

    995f74601dd77657ac67a28bec2a091b

    SHA1

    c0a44a33d3a1786b0707c653b634c929708c2de2

    SHA256

    57de72feedf6806f4f8eac808ed4203ab9c05d6743a1ced8e3ca7cc651688dc6

    SHA512

    4bf432360541d331538630edb06904412aa2a4ead8393062d79ffd5e66cbf9689b6ff0c5ec0bc06ae57ec09ab2d6cc7601c630c9f9bc0225991e58840816a2d0

  • \Users\Admin\vdvev.exe

    Filesize

    100KB

    MD5

    995f74601dd77657ac67a28bec2a091b

    SHA1

    c0a44a33d3a1786b0707c653b634c929708c2de2

    SHA256

    57de72feedf6806f4f8eac808ed4203ab9c05d6743a1ced8e3ca7cc651688dc6

    SHA512

    4bf432360541d331538630edb06904412aa2a4ead8393062d79ffd5e66cbf9689b6ff0c5ec0bc06ae57ec09ab2d6cc7601c630c9f9bc0225991e58840816a2d0

  • \Users\Admin\vdvev.exe

    Filesize

    100KB

    MD5

    995f74601dd77657ac67a28bec2a091b

    SHA1

    c0a44a33d3a1786b0707c653b634c929708c2de2

    SHA256

    57de72feedf6806f4f8eac808ed4203ab9c05d6743a1ced8e3ca7cc651688dc6

    SHA512

    4bf432360541d331538630edb06904412aa2a4ead8393062d79ffd5e66cbf9689b6ff0c5ec0bc06ae57ec09ab2d6cc7601c630c9f9bc0225991e58840816a2d0

  • memory/1520-59-0x0000000000000000-mapping.dmp

  • memory/1628-56-0x00000000761F1000-0x00000000761F3000-memory.dmp

    Filesize

    8KB