Analysis

  • max time kernel
    170s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 07:42

General

  • Target

    f2c9ae3735430b930a81148c0bb470fcb733e456a2a942f859a1b59c4a7b2150.exe

  • Size

    135KB

  • MD5

    511aa2f2fe6196e032ec7fef83bb8d95

  • SHA1

    ce874f517d335a1e1ab0df99111df1d3adbc0d21

  • SHA256

    f2c9ae3735430b930a81148c0bb470fcb733e456a2a942f859a1b59c4a7b2150

  • SHA512

    78a4771ab5e531420a45338ae27a5a4dad11b50385964a739e7ecec2c55d3ee47cde148dfc1e82ce7e8b8eb8a04a7f9b784cdd640e490a84bc8ce621d2f8d1c0

Score
10/10

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2c9ae3735430b930a81148c0bb470fcb733e456a2a942f859a1b59c4a7b2150.exe
    "C:\Users\Admin\AppData\Local\Temp\f2c9ae3735430b930a81148c0bb470fcb733e456a2a942f859a1b59c4a7b2150.exe"
    1⤵
    • Modifies extensions of user files
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_HELP_instructions.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2000
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\f2c9ae3735430b930a81148c0bb470fcb733e456a2a942f859a1b59c4a7b2150.exe"
      2⤵
      • Deletes itself
      PID:2004
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1548

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\_HELP_instructions.bmp
    Filesize

    3.7MB

    MD5

    f7d1ddbde83eb7902b1be02498e36240

    SHA1

    534b55b7423252ea833918bb05a362aaebf2284a

    SHA256

    fb4f575802525ed5c5111d2fd2a12a46ffebd217230c196ed3477f78e5d96c15

    SHA512

    4d076b00986ff257534a27fc1b53a656638554ffb1fe287156a26b6b9570f9617bcdad997776ea4d505852a1bc8d94201175a0566d731205ef580bfba10f93c9

  • C:\Users\Admin\Desktop\_HELP_instructions.html
    Filesize

    9KB

    MD5

    87eb76726a4f42ce9e5c5b7c921e1d79

    SHA1

    82ceb41f892e4c75089c544379149e1be1e4cbf1

    SHA256

    b6888eb8107374091d66ff78a0cd9aad4767f079db1677677d904b48b8ab1860

    SHA512

    d72405e4a6d6cf946b5435709cd8c6f3a252faf94e756ad5dc4811e26c5ec3669d563eac9d1879b5f34f5bf04bdc0f17a401497fb5fa46264178625ccb4f4af0

  • memory/1668-54-0x00000000764C1000-0x00000000764C3000-memory.dmp
    Filesize

    8KB

  • memory/1668-55-0x0000000000150000-0x0000000000176000-memory.dmp
    Filesize

    152KB

  • memory/1668-56-0x0000000000150000-0x0000000000176000-memory.dmp
    Filesize

    152KB

  • memory/1668-59-0x0000000000150000-0x0000000000176000-memory.dmp
    Filesize

    152KB

  • memory/2004-58-0x0000000000000000-mapping.dmp