Analysis

  • max time kernel
    1620s
  • max time network
    1624s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    28-06-2022 17:40

General

  • Target

    5c91d98b73496259cc907a4fb562272b1bbaa91e0b1d02a8aa54fbee49e4749c.exe

  • Size

    211KB

  • MD5

    a36ce179802137661d4429992fde242b

  • SHA1

    ef461c73b2d0e0eae486c6615750e47f2a496a4a

  • SHA256

    5c91d98b73496259cc907a4fb562272b1bbaa91e0b1d02a8aa54fbee49e4749c

  • SHA512

    3fb6ff43c0dcbdae418d91db7e5d4560c4a39fecf0f62c99e6efa8a37816c3f2da705739104c918bd94c90e7154e54b700f822ffa16fa456f13f7c8e40fe9f78

Score
10/10

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c91d98b73496259cc907a4fb562272b1bbaa91e0b1d02a8aa54fbee49e4749c.exe
    "C:\Users\Admin\AppData\Local\Temp\5c91d98b73496259cc907a4fb562272b1bbaa91e0b1d02a8aa54fbee49e4749c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Users\Admin\AppData\Local\Temp\5c91d98b73496259cc907a4fb562272b1bbaa91e0b1d02a8aa54fbee49e4749c.exe
      "C:\Users\Admin\AppData\Local\Temp\5c91d98b73496259cc907a4fb562272b1bbaa91e0b1d02a8aa54fbee49e4749c.exe"
      2⤵
      • Sets desktop wallpaper using registry
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_HELP_instructions.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1084
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1504
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\5c91d98b73496259cc907a4fb562272b1bbaa91e0b1d02a8aa54fbee49e4749c.exe"
        3⤵
        • Deletes itself
        PID:820
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JURUNTOW.txt

    Filesize

    605B

    MD5

    54b41008324f6e61fdd5756cd57554db

    SHA1

    630966b6fcc686398b6c16ce54e059464b6b1fd0

    SHA256

    2d77b30b2a15685025e3875119ef1d7213a5a01218b22d842d08a488bb314296

    SHA512

    0525637106273aaa579af7de8af7d79235651087a62029e7b965b86d16f6249be318c0b1d233ad204ac63bc22df3f1fb1a25889055261f3ed905d784319ca671

  • C:\Users\Admin\Desktop\_HELP_instructions.bmp

    Filesize

    3.4MB

    MD5

    7e3e480dc699b0df26161f166bc572cc

    SHA1

    d9325a4509f1a17ac4f05f37320d7bbd80812d39

    SHA256

    e084c6e7d401c5ea337dd1944e827b622179de0174697868ba97a115b09a1d1d

    SHA512

    42cd9b6e477b9a4cc441b4446b7d19b3536007a6a254c7fc97f534f28f28e7acbab20debd7e4bf7c5395b48c2ab972abba5823d5842a7ec239296e70e38d417f

  • C:\Users\Admin\Desktop\_HELP_instructions.html

    Filesize

    10KB

    MD5

    da0fee60eaffb198a1a848e0d5d9e7af

    SHA1

    4e744b8bc85d8ac70cfff1f718a45b63aaf9fe06

    SHA256

    103961ceabe194c4d79bcf23a0e6aad51d072fa25128b46ff198e0dc08335da9

    SHA512

    700a08649444548830aa61819c8209c287063a43503e4c32f836d2553cbf5e45b8d7ee1b483bb1e1b1b4b6caf24ad64f852d5794814b83f04b4e54f4e6125684

  • \Users\Admin\AppData\Local\Temp\nsj2C60.tmp\System.dll

    Filesize

    11KB

    MD5

    ee260c45e97b62a5e42f17460d406068

    SHA1

    df35f6300a03c4d3d3bd69752574426296b78695

    SHA256

    e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27

    SHA512

    a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3

  • memory/820-64-0x0000000000000000-mapping.dmp

  • memory/1828-56-0x00000000003A0000-0x00000000003A3000-memory.dmp

    Filesize

    12KB

  • memory/1828-59-0x00000000003A0000-0x00000000003A3000-memory.dmp

    Filesize

    12KB

  • memory/1828-54-0x0000000075741000-0x0000000075743000-memory.dmp

    Filesize

    8KB

  • memory/1980-61-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1980-65-0x0000000000280000-0x00000000002A6000-memory.dmp

    Filesize

    152KB

  • memory/1980-62-0x0000000000280000-0x00000000002A6000-memory.dmp

    Filesize

    152KB

  • memory/1980-60-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1980-57-0x000000000040560B-mapping.dmp