Resubmissions

22-01-2021 08:00

210122-gm8njs1zdn 5

03-12-2020 11:22

201203-8vnj2wyrex 10

Analysis

  • max time kernel
    109s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    22-01-2021 08:00

General

  • Target

    15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll

  • Size

    507KB

  • MD5

    b916ccb2a2bf0381133e5b8ef9782e1f

  • SHA1

    4a740790a645000119070122c710e1bac020bd25

  • SHA256

    15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f

  • SHA512

    04f973bf5606bc585e9eacd2937503047b27530dfdf9a5b830fa2deb679fbbf84a9494504de6c37a8b48785dc7ccc74a1ab50b34a860729f66cdeb3bcfd2bcc8

Score
5/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 102 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll,#1
      2⤵
        PID:1496
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:564
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1156
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1992
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:900

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/360-6-0x000007FEF6190000-0x000007FEF640A000-memory.dmp

      Filesize

      2.5MB

    • memory/564-7-0x0000000000000000-mapping.dmp

    • memory/900-17-0x0000000000000000-mapping.dmp

    • memory/1156-11-0x0000000000000000-mapping.dmp

    • memory/1496-2-0x0000000000000000-mapping.dmp

    • memory/1496-3-0x0000000076271000-0x0000000076273000-memory.dmp

      Filesize

      8KB

    • memory/1496-4-0x0000000000210000-0x000000000025B000-memory.dmp

      Filesize

      300KB

    • memory/1496-5-0x00000000001B0000-0x00000000001C0000-memory.dmp

      Filesize

      64KB

    • memory/1496-9-0x00000000002E0000-0x00000000002E2000-memory.dmp

      Filesize

      8KB

    • memory/1540-16-0x0000000002340000-0x0000000002350000-memory.dmp

      Filesize

      64KB

    • memory/1608-10-0x000007FEFBBF1000-0x000007FEFBBF3000-memory.dmp

      Filesize

      8KB

    • memory/1992-13-0x0000000000000000-mapping.dmp