Resubmissions

05-06-2021 18:38

210605-hf9v5m752s 4

05-06-2021 18:30

210605-p2t1d7794j 10

Analysis

  • max time kernel
    123s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    05-06-2021 18:38

General

  • Target

    Grossly Minecraft 1..exe

  • Size

    8.4MB

  • MD5

    7c6c6b9e9111447af1236378c02566c2

  • SHA1

    21340606037756badc4332a8217545dd47e9f24b

  • SHA256

    8a516f2df2e8f496a4bf7866036797959e63bbb6658e1f82b671b85227afecb5

  • SHA512

    2a64e4d159cfc1748eb4768d6072df5c6014a01c81681d26aa35ec9ec1e9346fd3961f51d3db5ff424120ee01486b7f92685d0ec8e935488f2b82cd2b40a2745

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Grossly Minecraft 1..exe
    "C:\Users\Admin\AppData\Local\Temp\Grossly Minecraft 1..exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://java.com/download
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1736

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    6045baccf49e1eba0e674945311a06e6

    SHA1

    379c6234849eecede26fad192c2ee59e0f0221cb

    SHA256

    65830a65cb913bee83258e4ac3e140faf131e7eb084d39f7020c7acc825b0a58

    SHA512

    da32af6a730884e73956e4eb6bff61a1326b3ef8ba0a213b5b4aad6de4fbd471b3550b6ac2110f1d0b2091e33c70d44e498f897376f8e1998b1d2afac789abeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    1a4fb171586472f96229ef66e41cb9fa

    SHA1

    070e3aee9453f83a0a8bb15a3d302c1678dabe00

    SHA256

    67c0d6d77d7599a74d5c2ecf6e6b2a37fc7239373b2511e2fc8bf4f631ccb4ad

    SHA512

    7dfae7a2ccce9f7a187e41b185f42f44bc1b40090388607764377ac941e85f56cad088172a90fdfd60a965dac37aebabbc31fc7a0ed5249a446116e6f8c481b2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\sgyae4t\imagestore.dat
    MD5

    aae61ae698bcedd3c8d48e754b56950b

    SHA1

    480b1266d5af5838714c7b9d551d77a257e2f949

    SHA256

    998990544e88a3f0b7c027f9e233b7cfe38817b12864f981971d201121b55011

    SHA512

    bfe90b26f64fc0f8495bc7c590ccba7c1fa71e3e683c7e46ee7ccaf720dd19d9dc1e869ce99a1a8fd8af12fb2a2166019c4296c709d5243906ef78628e9132b6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3HUKAVNJ.txt
    MD5

    c528d636c5e0da61be13ee6b1df391b7

    SHA1

    c748fa79ca3589cf900d91f096fe99aed6649c44

    SHA256

    5d3f013f6c1b390075402ee9ef5f7a104a1e088fdfefe9130b07e189719836e9

    SHA512

    483708d5945ce757948d3eda30ba954fa60d1052db8c090066660ef2a5613114c7c47bee877774eed8945adfc6749e00d3d4213e48b517ad908f9a9428585601

  • memory/368-59-0x0000000076661000-0x0000000076663000-memory.dmp
    Filesize

    8KB

  • memory/1140-60-0x0000000000000000-mapping.dmp
  • memory/1140-61-0x000007FEFBDC1000-0x000007FEFBDC3000-memory.dmp
    Filesize

    8KB

  • memory/1736-62-0x0000000000000000-mapping.dmp
  • memory/1736-64-0x0000000000550000-0x0000000000552000-memory.dmp
    Filesize

    8KB