Analysis

  • max time kernel
    114s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22-01-2021 15:04

General

  • Target

    https://j.mp/3bZ6ZG7

  • Sample

    210122-ll8z5fc276

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 5 IoCs
  • Program crash 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 99 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://j.mp/3bZ6ZG7
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:692 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1404
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 2980
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3624
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:692 CREDAT:148482 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 3368
        3⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1708
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:692 CREDAT:148483 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 2392
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 2464
        3⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        PID:3988
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:692 CREDAT:148485 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2872
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 2380
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 2456
        3⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        PID:416
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:692 CREDAT:279554 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 3388
        3⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        PID:652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 3308
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3176
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:692 CREDAT:148486 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:588
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:692 CREDAT:279558 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3728
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 1508
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3200
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 2472
        3⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        PID:3204

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RW8YYLAG\expressinstall[1].htm
    MD5

    bb99ee39a8e125db06398286defcba8f

    SHA1

    7e9687ad6ce7448f774e31573c10b31db3d2b708

    SHA256

    2bc8b01b479ef42aa7d1f1b1bc60269728cef10f465490a91b8be95df7883cfd

    SHA512

    9bcc5a60e651f16d5da9c523cd395b6dbfee8341aa3e89f9d1be3ba8afa35d2287bc9c668ba4dbc7194e0d2799ae93725875a1b42e9d6e6ba2e50171bfb7e434

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RW8YYLAG\expressinstall[1].htm
    MD5

    bb99ee39a8e125db06398286defcba8f

    SHA1

    7e9687ad6ce7448f774e31573c10b31db3d2b708

    SHA256

    2bc8b01b479ef42aa7d1f1b1bc60269728cef10f465490a91b8be95df7883cfd

    SHA512

    9bcc5a60e651f16d5da9c523cd395b6dbfee8341aa3e89f9d1be3ba8afa35d2287bc9c668ba4dbc7194e0d2799ae93725875a1b42e9d6e6ba2e50171bfb7e434

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RW8YYLAG\expressinstall[2].htm
    MD5

    bb99ee39a8e125db06398286defcba8f

    SHA1

    7e9687ad6ce7448f774e31573c10b31db3d2b708

    SHA256

    2bc8b01b479ef42aa7d1f1b1bc60269728cef10f465490a91b8be95df7883cfd

    SHA512

    9bcc5a60e651f16d5da9c523cd395b6dbfee8341aa3e89f9d1be3ba8afa35d2287bc9c668ba4dbc7194e0d2799ae93725875a1b42e9d6e6ba2e50171bfb7e434

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UOAPEAJQ\expressinstall[1].htm
    MD5

    bb99ee39a8e125db06398286defcba8f

    SHA1

    7e9687ad6ce7448f774e31573c10b31db3d2b708

    SHA256

    2bc8b01b479ef42aa7d1f1b1bc60269728cef10f465490a91b8be95df7883cfd

    SHA512

    9bcc5a60e651f16d5da9c523cd395b6dbfee8341aa3e89f9d1be3ba8afa35d2287bc9c668ba4dbc7194e0d2799ae93725875a1b42e9d6e6ba2e50171bfb7e434

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XMX44WX9\expressinstall[1].htm
    MD5

    bb99ee39a8e125db06398286defcba8f

    SHA1

    7e9687ad6ce7448f774e31573c10b31db3d2b708

    SHA256

    2bc8b01b479ef42aa7d1f1b1bc60269728cef10f465490a91b8be95df7883cfd

    SHA512

    9bcc5a60e651f16d5da9c523cd395b6dbfee8341aa3e89f9d1be3ba8afa35d2287bc9c668ba4dbc7194e0d2799ae93725875a1b42e9d6e6ba2e50171bfb7e434

  • memory/416-21-0x00000000049D0000-0x00000000049D1000-memory.dmp
    Filesize

    4KB

  • memory/588-24-0x0000000000000000-mapping.dmp
  • memory/652-27-0x0000000004320000-0x0000000004321000-memory.dmp
    Filesize

    4KB

  • memory/672-7-0x0000000000000000-mapping.dmp
  • memory/988-6-0x0000000000000000-mapping.dmp
  • memory/1176-9-0x0000000004810000-0x0000000004811000-memory.dmp
    Filesize

    4KB

  • memory/1404-2-0x0000000000000000-mapping.dmp
  • memory/1708-16-0x00000000047C0000-0x00000000047C1000-memory.dmp
    Filesize

    4KB

  • memory/2368-20-0x0000000004470000-0x0000000004471000-memory.dmp
    Filesize

    4KB

  • memory/2872-17-0x0000000000000000-mapping.dmp
  • memory/3176-26-0x0000000004D00000-0x0000000004D01000-memory.dmp
    Filesize

    4KB

  • memory/3200-32-0x0000000004E60000-0x0000000004E61000-memory.dmp
    Filesize

    4KB

  • memory/3204-35-0x0000000004990000-0x0000000004991000-memory.dmp
    Filesize

    4KB

  • memory/3624-4-0x0000000004780000-0x0000000004781000-memory.dmp
    Filesize

    4KB

  • memory/3624-3-0x0000000004780000-0x0000000004781000-memory.dmp
    Filesize

    4KB

  • memory/3728-30-0x0000000000000000-mapping.dmp
  • memory/3988-12-0x0000000004730000-0x0000000004731000-memory.dmp
    Filesize

    4KB

  • memory/4020-18-0x0000000000000000-mapping.dmp