Analysis

  • max time kernel
    4294195s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    28-03-2022 16:50

General

  • Target

    8a30d72bb314ae7eab1952c7bef22a34147680166cf451c5d5843179fadfa154.exe

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a30d72bb314ae7eab1952c7bef22a34147680166cf451c5d5843179fadfa154.exe
    "C:\Users\Admin\AppData\Local\Temp\8a30d72bb314ae7eab1952c7bef22a34147680166cf451c5d5843179fadfa154.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/klija
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2044
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:1972

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      020e27a7b552ab0a63bb42f98841b807

      SHA1

      f7a7df04cb4e1e929bc324b2d41da66440db1f57

      SHA256

      17ee291f40d578c0c68417c1475c1605586aed3bb2dd53e7fbeb60d96e70db29

      SHA512

      1fd268152fc94de67b222071770278ac6e2a0d41f9e2312b5d168da0d5c2805ff57f6d0578e1fcd7ea0964ad496fee8117b18ce1346d4f4124dc65e9134ad644

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w8w9llr\imagestore.dat
      Filesize

      28KB

      MD5

      328f934524db8501184db5c9cab951ad

      SHA1

      266702ba72872f5378fb67c655db89cb410f9362

      SHA256

      9f21546701d5b469282596af7afab953896204500295709f4685a45076c2f3de

      SHA512

      38151955d3aabb1cf4daf5a941f61bb2d6aecc2fe5fe80220df17276cd37a6772281471c22326b2253431cc99b38ff9107fdd1a1a637ddeee04c95db73aae925

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\69LHZA1W.txt
      Filesize

      608B

      MD5

      033aa19d9ee7476efee933dfe06ca742

      SHA1

      8f0b2b61d7d104bfcb9b8698038f8734d7e918bf

      SHA256

      1084ea07c81658642410451a59a7711b5e1521a68898c06a12bfb944633adfda

      SHA512

      54228176614cbac0a403307ed3a368044d0e068be45bae8299be073b31cb03be3c0d4bbaaa6dc68a39b462e2a5fd23b63155c854e3db00a73622c92af57679f4

    • memory/1724-54-0x000007FEFBA61000-0x000007FEFBA63000-memory.dmp
      Filesize

      8KB

    • memory/1972-55-0x0000000000000000-mapping.dmp