Analysis

  • max time kernel
    4294180s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    12-03-2022 20:48

General

  • Target

    79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe

  • Size

    552KB

  • MD5

    34f2cc16d84f7522f05d5333ed3913dd

  • SHA1

    b7eed00ff0aa9da390e3f3aca0eaecd6bd685006

  • SHA256

    79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3

  • SHA512

    f0efd072e7718390aa0371879a2a9eabe01ea29d49063a77df04f37bd9bbfb250fdec95b3df7a1874182aec3af5dd4de78fd6dbb87bbb594fc66243a6765b1f8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe
    "C:\Users\Admin\AppData\Local\Temp\79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1392-54-0x0000000075471000-0x0000000075473000-memory.dmp

    Filesize

    8KB