Resubmissions

08/12/2021, 11:46

211208-nxfx8scgh4 3

08/07/2021, 12:20

210708-lww6e74kma 1

08/07/2021, 07:33

210708-x3v895zhz2 1

Analysis

  • max time kernel
    121s
  • max time network
    120s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    08/12/2021, 11:46

General

  • Target

    RsEncP.exe

  • Size

    195KB

  • MD5

    1e8c10aca8b1af079d130d59585bbe87

  • SHA1

    fffad47c0363a714ad2b1804ec98fd86e1577e88

  • SHA256

    22240b86f52405d2d69523a3c74e5aa576e5251d72cccbf07e91273e4391a324

  • SHA512

    cddd29afc17bca6324aaf422aa197fe2b2343f587aeadd40b3b5e13cddebf94a65bf46ab87ba66288562d899357fbb726df127ce316c2d4e930f8415cee09ef8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RsEncP.exe
    "C:\Users\Admin\AppData\Local\Temp\RsEncP.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3460
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://116.123.119.125:50007//Pages/ResultCollect/Msg_Pop.aspx?strKey=dDcyZkNRSExEVGowSXhvOUM1QXJYamFsQUNYcHdXajExOE9tV0xqczNoST0=&p_encode=dkc3aTlVZTdLWE1MZkJWaHc4aXg0OWF6UWJGTGFYL2J6dmI3bEhVK0Z2QVJnaEtlSmdyTHZhdUJZZTgzWmdjZ1NYY0E1blcxZld6SDQzcGN0clE2UTV2NVEreUhza1pOOVV0cyt2Y2hDU1FOdk9XbkdkS3FSS01LeVdzeERQb3NFNm5uc3BaZ3VhUHZIWjBpTVZtaUpRPT0=&p_ip=175.196.87.251&p_host=175.196.87.251
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:508
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:508 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/508-147-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-129-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-185-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-181-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-180-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-179-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-178-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-127-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-177-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-145-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-131-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-132-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-133-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-134-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-135-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-136-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-137-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-139-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-140-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-141-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-143-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-176-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-144-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-128-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-148-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-149-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-150-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-175-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-153-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-154-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-156-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-157-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-159-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-161-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-162-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-163-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-167-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-168-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/508-169-0x00007FF9B89A0000-0x00007FF9B8A0B000-memory.dmp

    Filesize

    428KB

  • memory/3460-120-0x00000000052C0000-0x00000000052C1000-memory.dmp

    Filesize

    4KB

  • memory/3460-118-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/3460-125-0x0000000004CB0000-0x0000000004D42000-memory.dmp

    Filesize

    584KB

  • memory/3460-124-0x0000000004CB0000-0x0000000004D42000-memory.dmp

    Filesize

    584KB

  • memory/3460-123-0x0000000008DF0000-0x0000000008DF1000-memory.dmp

    Filesize

    4KB

  • memory/3460-122-0x0000000004E90000-0x0000000004E91000-memory.dmp

    Filesize

    4KB

  • memory/3460-121-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

    Filesize

    4KB