Analysis

  • max time kernel
    151s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2022 03:07

General

  • Target

    cce715743a10eb6cbafcc52fc4101c7bbe78f7303544e22e080173e4715a1e55.exe

  • Size

    268KB

  • MD5

    afd31de409809e0d07a7ac0b44b59106

  • SHA1

    5d118ee962fb204e41c29e84a3b7bcb18a13ae9e

  • SHA256

    cce715743a10eb6cbafcc52fc4101c7bbe78f7303544e22e080173e4715a1e55

  • SHA512

    f882f4a343f61da6a9ad3c882289cd3c111bfaa2bb95bc8203c7bcc8679d06b8638ca3e2d00e6d10778512a547e0b6450a8dca4d3472dedafd0402a404149f8d

  • SSDEEP

    3072:JJyQnQLmvDg1FuBvGin8DFinxqRXY7yOsbbursqfHX0WRIh:JBQLt18FT8ZinxxyOsfcHEWRe

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cce715743a10eb6cbafcc52fc4101c7bbe78f7303544e22e080173e4715a1e55.exe
    "C:\Users\Admin\AppData\Local\Temp\cce715743a10eb6cbafcc52fc4101c7bbe78f7303544e22e080173e4715a1e55.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\nuuecoz.exe
      "C:\Users\Admin\nuuecoz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\nuuecoz.exe

    Filesize

    268KB

    MD5

    899c144e67d70b92f333a80c88b38d9d

    SHA1

    e1d95b4b2129b1fd86564dc475dcd7b37bb9322d

    SHA256

    2a6466ba7210aa5a2c5bec72ea498a98ce8d89974b4a14ae659c347e04a751ac

    SHA512

    9362c606c5f24319fe75a8505e670fbf9ff5b11aa5e9caa65f947d0a3dae98a82a3f89868cd07ee9cdbaa58c536b523546e5dcc950d2f13380e711b4c623d992

  • C:\Users\Admin\nuuecoz.exe

    Filesize

    268KB

    MD5

    899c144e67d70b92f333a80c88b38d9d

    SHA1

    e1d95b4b2129b1fd86564dc475dcd7b37bb9322d

    SHA256

    2a6466ba7210aa5a2c5bec72ea498a98ce8d89974b4a14ae659c347e04a751ac

    SHA512

    9362c606c5f24319fe75a8505e670fbf9ff5b11aa5e9caa65f947d0a3dae98a82a3f89868cd07ee9cdbaa58c536b523546e5dcc950d2f13380e711b4c623d992

  • \Users\Admin\nuuecoz.exe

    Filesize

    268KB

    MD5

    899c144e67d70b92f333a80c88b38d9d

    SHA1

    e1d95b4b2129b1fd86564dc475dcd7b37bb9322d

    SHA256

    2a6466ba7210aa5a2c5bec72ea498a98ce8d89974b4a14ae659c347e04a751ac

    SHA512

    9362c606c5f24319fe75a8505e670fbf9ff5b11aa5e9caa65f947d0a3dae98a82a3f89868cd07ee9cdbaa58c536b523546e5dcc950d2f13380e711b4c623d992

  • \Users\Admin\nuuecoz.exe

    Filesize

    268KB

    MD5

    899c144e67d70b92f333a80c88b38d9d

    SHA1

    e1d95b4b2129b1fd86564dc475dcd7b37bb9322d

    SHA256

    2a6466ba7210aa5a2c5bec72ea498a98ce8d89974b4a14ae659c347e04a751ac

    SHA512

    9362c606c5f24319fe75a8505e670fbf9ff5b11aa5e9caa65f947d0a3dae98a82a3f89868cd07ee9cdbaa58c536b523546e5dcc950d2f13380e711b4c623d992

  • memory/1120-56-0x0000000075291000-0x0000000075293000-memory.dmp

    Filesize

    8KB

  • memory/1716-59-0x0000000000000000-mapping.dmp