Analysis

  • max time kernel
    151s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 03:11

General

  • Target

    ddc693bce94bd6629d626b5109176395c016bff5bc83d63dc64cb7947f70fb36.exe

  • Size

    184KB

  • MD5

    710ff8eea0ddc9236fd55813fc8e8b0d

  • SHA1

    32f5cf6f2844940a94378d881e1072d84778265c

  • SHA256

    ddc693bce94bd6629d626b5109176395c016bff5bc83d63dc64cb7947f70fb36

  • SHA512

    fe9714388b278ff036e18c2a1a305ddd9087777ac73746de7c7f9e3b4279d52183dff2a8d42d3eb98e86b771d35331f4eb635f5448187e823bce857d1f700c4c

  • SSDEEP

    3072:b1h1cfl/BTyzcM+Knvmb7/D263i4qMbBQhAKIWOD2r1oX1/hcNcfAUane4RKsUZX:RClpTFzKnvmb7/D26y4qMSyKbOD2r1o1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddc693bce94bd6629d626b5109176395c016bff5bc83d63dc64cb7947f70fb36.exe
    "C:\Users\Admin\AppData\Local\Temp\ddc693bce94bd6629d626b5109176395c016bff5bc83d63dc64cb7947f70fb36.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\sqleig.exe
      "C:\Users\Admin\sqleig.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\sqleig.exe

          Filesize

          184KB

          MD5

          8fda9e1eb2ad8b9cd6139b8887967f60

          SHA1

          d95325ae7023b237d04bc626b251e00feae0ebbb

          SHA256

          6de7254688f62a97171fddf39d70fa36752040fdcf3708edcc1750d6b74fa1e1

          SHA512

          fe883ade521ddbf7771d92c6af7d4da738c9d1a766fbe28de4f4d026cb1dd95853e1db601032448e21577f3b6486ed8a3dbb4a180d73f2d98e89891675c245fe

        • C:\Users\Admin\sqleig.exe

          Filesize

          184KB

          MD5

          8fda9e1eb2ad8b9cd6139b8887967f60

          SHA1

          d95325ae7023b237d04bc626b251e00feae0ebbb

          SHA256

          6de7254688f62a97171fddf39d70fa36752040fdcf3708edcc1750d6b74fa1e1

          SHA512

          fe883ade521ddbf7771d92c6af7d4da738c9d1a766fbe28de4f4d026cb1dd95853e1db601032448e21577f3b6486ed8a3dbb4a180d73f2d98e89891675c245fe

        • \Users\Admin\sqleig.exe

          Filesize

          184KB

          MD5

          8fda9e1eb2ad8b9cd6139b8887967f60

          SHA1

          d95325ae7023b237d04bc626b251e00feae0ebbb

          SHA256

          6de7254688f62a97171fddf39d70fa36752040fdcf3708edcc1750d6b74fa1e1

          SHA512

          fe883ade521ddbf7771d92c6af7d4da738c9d1a766fbe28de4f4d026cb1dd95853e1db601032448e21577f3b6486ed8a3dbb4a180d73f2d98e89891675c245fe

        • \Users\Admin\sqleig.exe

          Filesize

          184KB

          MD5

          8fda9e1eb2ad8b9cd6139b8887967f60

          SHA1

          d95325ae7023b237d04bc626b251e00feae0ebbb

          SHA256

          6de7254688f62a97171fddf39d70fa36752040fdcf3708edcc1750d6b74fa1e1

          SHA512

          fe883ade521ddbf7771d92c6af7d4da738c9d1a766fbe28de4f4d026cb1dd95853e1db601032448e21577f3b6486ed8a3dbb4a180d73f2d98e89891675c245fe

        • memory/1684-56-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

          Filesize

          8KB