Analysis

  • max time kernel
    139s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    13-07-2021 08:46

General

  • Target

    otc 4 fix (no depot).exe

  • Size

    36.1MB

  • MD5

    2af397334802bc90ee5f14270e51446e

  • SHA1

    38d211c10f0b10ee007a9d3fa39513485a08524d

  • SHA256

    6d5225ec9ee44d1d375dae8f6df80dcd102faa80c1d9072deed04635635c5dc4

  • SHA512

    b4ddc0dc3e376e398646a09ccf225ee628aefe75ff83d384fc180dd79aef2732b21db423b0c4144ba1d64f48b1d93d39056373bbecd6ec7c7fa482963773e532

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Drops startup file 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Detects Pyinstaller 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\otc 4 fix (no depot).exe
    "C:\Users\Admin\AppData\Local\Temp\otc 4 fix (no depot).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4615.tmp\4625.bat "C:\Users\Admin\AppData\Local\Temp\otc 4 fix (no depot).exe""
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Local\Temp\4615.tmp\INJECT.exe
        INJECT.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Users\Admin\AppData\Local\Temp\4615.tmp\INJECT.exe
          INJECT.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: GetForegroundWindowSpam
          PID:2040
      • C:\Users\Admin\AppData\Local\Temp\4615.tmp\CHEAT.exe
        CHEAT.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Users\Admin\AppData\Local\Temp\4615.tmp\CHEAT.exe
          CHEAT.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: GetForegroundWindowSpam
          PID:1224
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://onetap.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1208

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    2902de11e30dcc620b184e3bb0f0c1cb

    SHA1

    5d11d14a2558801a2688dc2d6dfad39ac294f222

    SHA256

    e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544

    SHA512

    efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    a7cbfe28f079101be129c58c7b47cdd2

    SHA1

    4817e26fb21ee9a775dd92b676a985e270610fb7

    SHA256

    9d9b4b28882a1d4a28b03450909c74079e04270d897e603607e0b183841c2731

    SHA512

    5edf612e60ea2d0ee14fea882761ad6e128e22ecf300e14fa48845dffeaa3564222c991f82cfa1371c6cb738d0190d6324fb311aba59dcafe11a19cbf8e93e81

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bq3gxmw\imagestore.dat
    MD5

    53e588dafd10b2028e5f8682c6103e89

    SHA1

    36c9e29ee23cd6e12f9e10c1b803c12dab64d987

    SHA256

    9327d0937237c5cdcb813d92fe151e414f82fe0b86030f90d622f783b44960a6

    SHA512

    5e69d23a6fec021638e9a6cf9ac81ab798eaf5a6d6b7df3ee24f4b0abbb02287c518cf74b407fb68c79545f1263c9f120a6fed255783baa27e56ad72dd479510

  • C:\Users\Admin\AppData\Local\Temp\4615.tmp\4625.bat
    MD5

    54bb59dbd2927966702a0e8ccc778ee1

    SHA1

    b6e2ece32a856393a6e40c65c5e05ddd3e1b171d

    SHA256

    405533bd21c1ba7bf54000cf245751f67664fadaff03d38c6280e7bff00fd006

    SHA512

    e64e84683f28cf9a9d9271a37b5c1806d92647e3bd368821de07d83aadba67b94217c9f1951d275a37b4643be2a97cd161b1102321bb01bbaeffead82efb4c2c

  • C:\Users\Admin\AppData\Local\Temp\4615.tmp\CHEAT.exe
    MD5

    c480f938d24a2e21d060b44a4e4e5f72

    SHA1

    68be2577912e115ac454554da0db0bbb66edec50

    SHA256

    e23c7a88601e0c149a4f56bb6084467e8d7f1d0b9001d69a49cf9aa4d2e1b8df

    SHA512

    554eea6aecb1697ecc761144bc29191ee38a46612e130bea769b874a95074a6ef7977b51ba47fb2e6fd3333878898fdb85e13ef86d14a2a9c7c4ea3b28dc8f06

  • C:\Users\Admin\AppData\Local\Temp\4615.tmp\CHEAT.exe
    MD5

    c480f938d24a2e21d060b44a4e4e5f72

    SHA1

    68be2577912e115ac454554da0db0bbb66edec50

    SHA256

    e23c7a88601e0c149a4f56bb6084467e8d7f1d0b9001d69a49cf9aa4d2e1b8df

    SHA512

    554eea6aecb1697ecc761144bc29191ee38a46612e130bea769b874a95074a6ef7977b51ba47fb2e6fd3333878898fdb85e13ef86d14a2a9c7c4ea3b28dc8f06

  • C:\Users\Admin\AppData\Local\Temp\4615.tmp\CHEAT.exe
    MD5

    c480f938d24a2e21d060b44a4e4e5f72

    SHA1

    68be2577912e115ac454554da0db0bbb66edec50

    SHA256

    e23c7a88601e0c149a4f56bb6084467e8d7f1d0b9001d69a49cf9aa4d2e1b8df

    SHA512

    554eea6aecb1697ecc761144bc29191ee38a46612e130bea769b874a95074a6ef7977b51ba47fb2e6fd3333878898fdb85e13ef86d14a2a9c7c4ea3b28dc8f06

  • C:\Users\Admin\AppData\Local\Temp\4615.tmp\INJECT.exe
    MD5

    fe829055d645035e3251a8e7fc36238e

    SHA1

    a68e5896a99b9f16eb1d480f493663d45a1d41e5

    SHA256

    73f6d2d8062e17bd3b6e169de7666c7650302fff4330bd5c5f96565dd7f555dd

    SHA512

    309f989e7d25950960bb600ba8b0931834cb0ed94e41910bd416d2358926a1ff360537906f3ad04ca6726b5ece0ffce857986e9675fe4e09c45b3631739a7b13

  • C:\Users\Admin\AppData\Local\Temp\4615.tmp\INJECT.exe
    MD5

    fe829055d645035e3251a8e7fc36238e

    SHA1

    a68e5896a99b9f16eb1d480f493663d45a1d41e5

    SHA256

    73f6d2d8062e17bd3b6e169de7666c7650302fff4330bd5c5f96565dd7f555dd

    SHA512

    309f989e7d25950960bb600ba8b0931834cb0ed94e41910bd416d2358926a1ff360537906f3ad04ca6726b5ece0ffce857986e9675fe4e09c45b3631739a7b13

  • C:\Users\Admin\AppData\Local\Temp\4615.tmp\INJECT.exe
    MD5

    fe829055d645035e3251a8e7fc36238e

    SHA1

    a68e5896a99b9f16eb1d480f493663d45a1d41e5

    SHA256

    73f6d2d8062e17bd3b6e169de7666c7650302fff4330bd5c5f96565dd7f555dd

    SHA512

    309f989e7d25950960bb600ba8b0931834cb0ed94e41910bd416d2358926a1ff360537906f3ad04ca6726b5ece0ffce857986e9675fe4e09c45b3631739a7b13

  • C:\Users\Admin\AppData\Local\Temp\_MEI11722\python39.dll
    MD5

    5cd203d356a77646856341a0c9135fc6

    SHA1

    a1f4ac5cc2f5ecb075b3d0129e620784814a48f7

    SHA256

    a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a

    SHA512

    390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f

  • C:\Users\Admin\AppData\Local\Temp\_MEI19722\python39.dll
    MD5

    7d1adb0020f8741ee1f868f89a5baaa6

    SHA1

    ccd754886df8d40dd21214ca4c0a16166f03b0ea

    SHA256

    185fdf02a835008b741751a3bf67d51f306f6ede2a5ba8bbb6edfeeb646fa232

    SHA512

    cda07ab982e2fc2347f6efbf6ee0d9e11006cd9d96058bb743b2c7b86a7ee3337485220e486bf885214fff362080dfbe12cc129911818fbe9aa46e1e8e81b9e5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7VNU5C3N.txt
    MD5

    3a587d52171f6aaf6125a56963fc5569

    SHA1

    c3e19aa9c8f8e388351aebb384e7fa5e002e0c98

    SHA256

    9335103f9ac26782e42d8846a204a6605fb511415a6aa4ae194fefba2534bc8e

    SHA512

    aeee63645626568b932785fc9c8a1e803b6a3378c068c6a5d457688b3e6186dc469c7e86a505fce24bdeb7d4efcb059c91bdefb4b2daa4506c610576f0984ceb

  • \Users\Admin\AppData\Local\Temp\4615.tmp\CHEAT.exe
    MD5

    c480f938d24a2e21d060b44a4e4e5f72

    SHA1

    68be2577912e115ac454554da0db0bbb66edec50

    SHA256

    e23c7a88601e0c149a4f56bb6084467e8d7f1d0b9001d69a49cf9aa4d2e1b8df

    SHA512

    554eea6aecb1697ecc761144bc29191ee38a46612e130bea769b874a95074a6ef7977b51ba47fb2e6fd3333878898fdb85e13ef86d14a2a9c7c4ea3b28dc8f06

  • \Users\Admin\AppData\Local\Temp\4615.tmp\INJECT.exe
    MD5

    fe829055d645035e3251a8e7fc36238e

    SHA1

    a68e5896a99b9f16eb1d480f493663d45a1d41e5

    SHA256

    73f6d2d8062e17bd3b6e169de7666c7650302fff4330bd5c5f96565dd7f555dd

    SHA512

    309f989e7d25950960bb600ba8b0931834cb0ed94e41910bd416d2358926a1ff360537906f3ad04ca6726b5ece0ffce857986e9675fe4e09c45b3631739a7b13

  • \Users\Admin\AppData\Local\Temp\4615.tmp\INJECT.exe
    MD5

    fe829055d645035e3251a8e7fc36238e

    SHA1

    a68e5896a99b9f16eb1d480f493663d45a1d41e5

    SHA256

    73f6d2d8062e17bd3b6e169de7666c7650302fff4330bd5c5f96565dd7f555dd

    SHA512

    309f989e7d25950960bb600ba8b0931834cb0ed94e41910bd416d2358926a1ff360537906f3ad04ca6726b5ece0ffce857986e9675fe4e09c45b3631739a7b13

  • \Users\Admin\AppData\Local\Temp\4615.tmp\INJECT.exe
    MD5

    fe829055d645035e3251a8e7fc36238e

    SHA1

    a68e5896a99b9f16eb1d480f493663d45a1d41e5

    SHA256

    73f6d2d8062e17bd3b6e169de7666c7650302fff4330bd5c5f96565dd7f555dd

    SHA512

    309f989e7d25950960bb600ba8b0931834cb0ed94e41910bd416d2358926a1ff360537906f3ad04ca6726b5ece0ffce857986e9675fe4e09c45b3631739a7b13

  • \Users\Admin\AppData\Local\Temp\_MEI11722\python39.dll
    MD5

    5cd203d356a77646856341a0c9135fc6

    SHA1

    a1f4ac5cc2f5ecb075b3d0129e620784814a48f7

    SHA256

    a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a

    SHA512

    390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f

  • \Users\Admin\AppData\Local\Temp\_MEI19722\python39.dll
    MD5

    7d1adb0020f8741ee1f868f89a5baaa6

    SHA1

    ccd754886df8d40dd21214ca4c0a16166f03b0ea

    SHA256

    185fdf02a835008b741751a3bf67d51f306f6ede2a5ba8bbb6edfeeb646fa232

    SHA512

    cda07ab982e2fc2347f6efbf6ee0d9e11006cd9d96058bb743b2c7b86a7ee3337485220e486bf885214fff362080dfbe12cc129911818fbe9aa46e1e8e81b9e5

  • memory/112-60-0x0000000075AF1000-0x0000000075AF3000-memory.dmp
    Filesize

    8KB

  • memory/1172-66-0x0000000000000000-mapping.dmp
  • memory/1208-79-0x0000000000000000-mapping.dmp
  • memory/1208-85-0x00000000006E0000-0x00000000006E2000-memory.dmp
    Filesize

    8KB

  • memory/1224-82-0x0000000000000000-mapping.dmp
  • memory/1692-73-0x0000000001FD0000-0x0000000001FE0000-memory.dmp
    Filesize

    64KB

  • memory/1692-71-0x0000000000000000-mapping.dmp
  • memory/1912-61-0x0000000000000000-mapping.dmp
  • memory/1912-70-0x000007FEFBAA1000-0x000007FEFBAA3000-memory.dmp
    Filesize

    8KB

  • memory/1972-68-0x0000000000000000-mapping.dmp
  • memory/2040-75-0x0000000000000000-mapping.dmp