Analysis

  • max time kernel
    4294180s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    12-03-2022 20:48

General

  • Target

    79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe

  • Size

    552KB

  • MD5

    34f2cc16d84f7522f05d5333ed3913dd

  • SHA1

    b7eed00ff0aa9da390e3f3aca0eaecd6bd685006

  • SHA256

    79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3

  • SHA512

    f0efd072e7718390aa0371879a2a9eabe01ea29d49063a77df04f37bd9bbfb250fdec95b3df7a1874182aec3af5dd4de78fd6dbb87bbb594fc66243a6765b1f8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe
    "C:\Users\Admin\AppData\Local\Temp\79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=79c87d552858845eecce7d11c6ef681dfa2d647c2aef20a1ad33be2507d415c3.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    MD5

    78a6f1a7abd83bf226edc71a6857511e

    SHA1

    9d68225dc52a5c284ddd39a35789fd8b4c6d2848

    SHA256

    7a2ad3338f5f027d0304c41401afe9df1d8b9103de79feb2ae423570c5c344ce

    SHA512

    be801aa05f0fb5f25c52f52e5508490d7c018c1f784ae6f3766f3fd6062252d9dea71558d7c10b28c1b1b71f7f47eb45491071e9ebf27542b8c2abc9590b0f63

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\shpg9mq\imagestore.dat

    MD5

    b5aa7f4a4848d14ff3059092ff3f3242

    SHA1

    442a6d29baa4f9360a0fa7679c5c276905ffcba2

    SHA256

    79de127fc93e79d866602a2b8c2b8156e57e2206a9c989e42491a3307df77bc0

    SHA512

    e5694e5dc2726261b8874cd16b9d7466811b8d864132241384ee0183bb358eb12b036a5fe1e27f8d3bb3b6ad8f46cee0c180d137dedf922198a3faf363ec9270

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NJNE38T8.txt

    MD5

    fad340da5253e6dfbd12158004a987b6

    SHA1

    6c351f4e2befa02549e17ee088b92d44faf21780

    SHA256

    716a0a250627f62abf979b449d1027b7abf2942296aa29de5b25fbd3d556d0d8

    SHA512

    22f79910758825a264d0e34e821d111bc766bb0efec83d7d25fa628b89332a8e52abf6b70c58c3c8dd32c587a4c65d1001013bac2bfa8580ccf62c6d1d5a8005

  • memory/1392-54-0x0000000075471000-0x0000000075473000-memory.dmp

    Filesize

    8KB