Analysis

  • max time kernel
    39s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    28-05-2022 01:46

General

  • Target

    0312f2bfbdeaf9061f4ba0443d87c2fce68846fcbc2ffaca194ddc79fbaed895.exe

  • Size

    5.4MB

  • MD5

    f3fa95da5c40de082f3fe90f65cc8ca0

  • SHA1

    554adccf1258d090eeaa5ce1094ba83246f09a50

  • SHA256

    0312f2bfbdeaf9061f4ba0443d87c2fce68846fcbc2ffaca194ddc79fbaed895

  • SHA512

    165776dd77e76bcc878b9b4c86aefb3ca4221b1c606226fe6341efe4a1ec22189d4e3df7298966bdae8ddd166af933b29305186ea7ad763a365f0b0da7e78218

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0312f2bfbdeaf9061f4ba0443d87c2fce68846fcbc2ffaca194ddc79fbaed895.exe
    "C:\Users\Admin\AppData\Local\Temp\0312f2bfbdeaf9061f4ba0443d87c2fce68846fcbc2ffaca194ddc79fbaed895.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\IDMShellExt64.dll"
      2⤵
        PID:1116

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/452-54-0x0000000075361000-0x0000000075363000-memory.dmp
      Filesize

      8KB

    • memory/1116-55-0x0000000000000000-mapping.dmp