Analysis

  • max time kernel
    29s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2023 12:08

General

  • Target

    infected2023041504/未命名文件夹/截图.exe

  • Size

    916KB

  • MD5

    f6746687c408ea7b0cb3947d3c57ad04

  • SHA1

    80bba28731f1473f36d25fdc9a1a9086e9b4e5cd

  • SHA256

    37b34fdec8f5b0fb71f768523551b488816d60dbc52cce1e351550da88a14bec

  • SHA512

    0838cf20a94b21d5bfa157d90af79a269bc2343531f386244de7de8f5a1128aa9e2633525ba0465ba611260dce78ac0912d60499cacb3abf5dbab2d83531139e

  • SSDEEP

    12288:PhUlUviaIgaL4zWE3E3tshKFyJ5rCwmUtzsdbWTv83o9fYdS7l:PhUlEiaId8SE3EdshksnmUtzsZWTYI+2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\infected2023041504\未命名文件夹\截图.exe
    "C:\Users\Admin\AppData\Local\Temp\infected2023041504\未命名文件夹\截图.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Users\Public\Videos\LiveUpdate360.exe
      "C:\Users\Public\Videos\LiveUpdate360.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Videos\LiveUpdate360.exe

    Filesize

    1.2MB

    MD5

    8adaf2860f9eff05e93e46cc05e04965

    SHA1

    60090ebbcdd34fa1fa0bd47ece44db8a0a5ce7c0

    SHA256

    94996ff3b1ca1c154421d8f3ad590bc65123e25e0b5c239985c4c15e2bc18620

    SHA512

    353675fe9ddc4d88987016f1e64fe820d249bfa3830eb1009bd2d8a1ea6344cf62b2a66fb641cfce06181140d9c133630b3c78eaf282c6338c6379b951381b79

  • memory/1112-65-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB