Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04-06-2022 03:39

General

  • Target

    117cec9b90336e72a71d8fa9c67e5f58ba0ae90e33a19805a6f4a36a50d68218.exe

  • Size

    100KB

  • MD5

    be04880708661c10c6dc83b9adc83756

  • SHA1

    942e64204031981a9861e2ae90e7c296eeac1519

  • SHA256

    117cec9b90336e72a71d8fa9c67e5f58ba0ae90e33a19805a6f4a36a50d68218

  • SHA512

    83bd19290de0acef2fdec699dda973479d8896fbcb920e2aecdc31405839019ac30d749afc148313a851de17a7b56440ec8156098d0d839a7374648c359408db

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\117cec9b90336e72a71d8fa9c67e5f58ba0ae90e33a19805a6f4a36a50d68218.exe
    "C:\Users\Admin\AppData\Local\Temp\117cec9b90336e72a71d8fa9c67e5f58ba0ae90e33a19805a6f4a36a50d68218.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:968
        • C:\Windows\SysWOW64\explorer.exe
          "C:\Windows\System32\explorer.exe" http://www.facebook.com
          4⤵
            PID:624
          • C:\Windows\msnmsgrss.exe
            "C:\Windows\msnmsgrss.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1516
            • C:\Windows\msnmsgrss.exe
              C:\Windows\msnmsgrss.exe
              5⤵
              • Executes dropped EXE
              PID:1840
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1196
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.facebook.com/
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:892
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:892 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:636

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      60KB

      MD5

      308336e7f515478969b24c13ded11ede

      SHA1

      8fb0cf42b77dbbef224a1e5fc38abc2486320775

      SHA256

      889b832323726a9f10ad03f85562048fdcfe20c9ff6f9d37412cf477b4e92ff9

      SHA512

      61ad97228cd6c3909ef3ac5e4940199971f293bdd0d5eb7916e60469573a44b6287c0fa1e0b6c1389df35eb6c9a7d2a61fdb318d4a886a3821ef5a9dab3ac24f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      380c2c8d7ec7c413784d5912c6efb304

      SHA1

      e6a07e16391143e1b0808f724e9f8c1833cafa24

      SHA256

      730bdb62c0ba8ea8ee1022d8364d88c24f8b84c7a4d35ffc497923266e590aff

      SHA512

      3959d387ea9d47eaab4c48ffe8c0dcc1bfe6c9c28e6867260b8657fe7b3764bb71b3af313744d39a172da325b759308dba77d61a048076b796f9016f63f3ee01

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.dat
      Filesize

      11KB

      MD5

      20a2eb166334559e3324f1c4e17c8293

      SHA1

      7f76fa56d2b175e9a7bf19fb8ebf468b0b65c6cd

      SHA256

      522f4d1427f58c1822e64fceaf0696fd3abd427ae93d4822e7bb71eceb01b62c

      SHA512

      251b70e0359cfd960e3b7e8599c3ec70ba05ceedccb5f0d5967246dfc3d5f1ede1b06a6dfad85065de1cac89826f03ee26a9d88441dc7d58d6990ddbfbf84a5f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\INFDLR7T.txt
      Filesize

      600B

      MD5

      16cf7842c3ecab7c46b776ec8dd77bd1

      SHA1

      cd6ce990d83247ec07eb704d0590bde290d3b4ee

      SHA256

      066fc71d20672eb37cb50934518c28bc57077c8d0b983438e55323d5997fd17e

      SHA512

      ed78f30320e9cb749c9769bcc3dd38773ac8af87f8062799a0a532214558edeaaeb77b7daa1df2988bd4bfbc66aff6bd67640410cdd07e07b48cc43eaa7c7f5b

    • C:\Windows\msnmsgrss.exe
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • C:\Windows\msnmsgrss.exe
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • C:\Windows\msnmsgrss.exe
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      Filesize

      45KB

      MD5

      ad090589116ae6ba1efb9d09ec7fb098

      SHA1

      f9efe2e2591204800787907583a88b2a87348b49

      SHA256

      5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

      SHA512

      37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

    • memory/624-94-0x0000000074371000-0x0000000074373000-memory.dmp
      Filesize

      8KB

    • memory/624-78-0x0000000000000000-mapping.dmp
    • memory/968-97-0x0000000000400000-0x000000000044C000-memory.dmp
      Filesize

      304KB

    • memory/968-77-0x0000000000400000-0x000000000044C000-memory.dmp
      Filesize

      304KB

    • memory/968-64-0x0000000000400000-0x000000000044C000-memory.dmp
      Filesize

      304KB

    • memory/968-70-0x0000000000405232-mapping.dmp
    • memory/968-69-0x0000000000400000-0x000000000044C000-memory.dmp
      Filesize

      304KB

    • memory/968-67-0x0000000000400000-0x000000000044C000-memory.dmp
      Filesize

      304KB

    • memory/968-66-0x0000000000400000-0x000000000044C000-memory.dmp
      Filesize

      304KB

    • memory/968-73-0x0000000000400000-0x000000000044C000-memory.dmp
      Filesize

      304KB

    • memory/968-63-0x0000000000400000-0x000000000044C000-memory.dmp
      Filesize

      304KB

    • memory/1080-54-0x00000000755C1000-0x00000000755C3000-memory.dmp
      Filesize

      8KB

    • memory/1196-96-0x000007FEFBCB1000-0x000007FEFBCB3000-memory.dmp
      Filesize

      8KB

    • memory/1476-57-0x0000000000000000-mapping.dmp
    • memory/1516-80-0x0000000000000000-mapping.dmp
    • memory/1840-98-0x0000000000400000-0x000000000044C000-memory.dmp
      Filesize

      304KB

    • memory/1840-99-0x0000000000400000-0x000000000044C000-memory.dmp
      Filesize

      304KB

    • memory/1840-90-0x0000000000405232-mapping.dmp