Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 14:31

General

  • Target

    a5f16cc3f8cf914733abf6a23cbd31161372e30542c4d27107ef7257de4d8736.exe

  • Size

    320KB

  • MD5

    02a17395ba534546deefd9b486394c8f

  • SHA1

    c0d2b397042913a7cd111c38718b3e3bdf411eae

  • SHA256

    a5f16cc3f8cf914733abf6a23cbd31161372e30542c4d27107ef7257de4d8736

  • SHA512

    b2d20ed377228c31276b229e2e0cced2d2d3ddc920e6780ffc3e0add0c9b44ffc8fcdd9b886816fbb137e460bad247ac24b1e4cf5ca7863e5000d93016436aa3

  • SSDEEP

    6144:eANa8SaX/m7bfTWarM1jP1pQcxMteDUy29Bn79Nu/NJ/V66xL4pFe5Sd:xa8SaX/m7bfTWa0QcxMteDUykB7zu/no

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5f16cc3f8cf914733abf6a23cbd31161372e30542c4d27107ef7257de4d8736.exe
    "C:\Users\Admin\AppData\Local\Temp\a5f16cc3f8cf914733abf6a23cbd31161372e30542c4d27107ef7257de4d8736.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\wsler.exe
      "C:\Users\Admin\wsler.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wsler.exe

    Filesize

    320KB

    MD5

    3c9e7184fbad37c387768c519a8edf25

    SHA1

    847f425134411a06361b387300b4d63726b21cef

    SHA256

    81c4ec7b22f71c2e6701f34b37d2b252e765c886b0eddf2aece93174f816540c

    SHA512

    edba1286e962ccfc97ee71795404e2babbd46659d104a74374a077dd38a42296169e1d27a1375c52260614797aafd63aba4efa11f8ea32f62ec4ea0a56f85c82

  • C:\Users\Admin\wsler.exe

    Filesize

    320KB

    MD5

    3c9e7184fbad37c387768c519a8edf25

    SHA1

    847f425134411a06361b387300b4d63726b21cef

    SHA256

    81c4ec7b22f71c2e6701f34b37d2b252e765c886b0eddf2aece93174f816540c

    SHA512

    edba1286e962ccfc97ee71795404e2babbd46659d104a74374a077dd38a42296169e1d27a1375c52260614797aafd63aba4efa11f8ea32f62ec4ea0a56f85c82

  • \Users\Admin\wsler.exe

    Filesize

    320KB

    MD5

    3c9e7184fbad37c387768c519a8edf25

    SHA1

    847f425134411a06361b387300b4d63726b21cef

    SHA256

    81c4ec7b22f71c2e6701f34b37d2b252e765c886b0eddf2aece93174f816540c

    SHA512

    edba1286e962ccfc97ee71795404e2babbd46659d104a74374a077dd38a42296169e1d27a1375c52260614797aafd63aba4efa11f8ea32f62ec4ea0a56f85c82

  • \Users\Admin\wsler.exe

    Filesize

    320KB

    MD5

    3c9e7184fbad37c387768c519a8edf25

    SHA1

    847f425134411a06361b387300b4d63726b21cef

    SHA256

    81c4ec7b22f71c2e6701f34b37d2b252e765c886b0eddf2aece93174f816540c

    SHA512

    edba1286e962ccfc97ee71795404e2babbd46659d104a74374a077dd38a42296169e1d27a1375c52260614797aafd63aba4efa11f8ea32f62ec4ea0a56f85c82

  • memory/1908-56-0x00000000762F1000-0x00000000762F3000-memory.dmp

    Filesize

    8KB