Analysis

  • max time kernel
    1607s
  • max time network
    1610s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    28-06-2022 17:18

General

  • Target

    fdd5325bd1371068d7948d57e640cd01869e5281e1e15eeddafa20448618a89d.exe

  • Size

    268KB

  • MD5

    63fb4f33561739b31aa174428905bd27

  • SHA1

    2340adeb468267329279c42bb16c3182bd463967

  • SHA256

    fdd5325bd1371068d7948d57e640cd01869e5281e1e15eeddafa20448618a89d

  • SHA512

    d95b827a6f8bcef238b56a218c29587518b45a7177c5aa2e002f80e3e1f945343d1b5090ddb5b75746066ec5e44b7f0aa59117c497bf116a2cd5dbc7cd9b4198

Score
10/10

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Deletes itself 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdd5325bd1371068d7948d57e640cd01869e5281e1e15eeddafa20448618a89d.exe
    "C:\Users\Admin\AppData\Local\Temp\fdd5325bd1371068d7948d57e640cd01869e5281e1e15eeddafa20448618a89d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Users\Admin\AppData\Local\Temp\fdd5325bd1371068d7948d57e640cd01869e5281e1e15eeddafa20448618a89d.exe
      C:\Users\Admin\AppData\Local\Temp\fdd5325bd1371068d7948d57e640cd01869e5281e1e15eeddafa20448618a89d.exe
      2⤵
      • Sets desktop wallpaper using registry
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_WHAT_is.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1888
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\fdd5325bd1371068d7948d57e640cd01869e5281e1e15eeddafa20448618a89d.exe"
        3⤵
        • Deletes itself
        PID:1804
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BZX9WLIC.txt

    Filesize

    604B

    MD5

    cd2005003e94b497267139c1bbe17d26

    SHA1

    8910224c418f79cd2590868174acc077de1dfc33

    SHA256

    677743ab05efc44456a58ab1f45de975b9eacb6bc8ff8bf30470843a9181ecf9

    SHA512

    e3425a05da12c45c4fb48411adfae314866189c2b4ce6926d655c40da28cca139da5fbabc8f6b460393bf68d384f92f4c5e4384c5e3603bb97bfb9a276ff357b

  • C:\Users\Admin\Desktop\_WHAT_is.bmp

    Filesize

    3.7MB

    MD5

    862c55987d4e5cc13ee7f55a303817c5

    SHA1

    c26d8850810ccf1e899c25f09e451bd3dce6bee7

    SHA256

    0cebaf1a0686520e2dbe8e326a5b5a2cbeb2f7ff4da230282373f8c215ad728d

    SHA512

    ae171a51f78f564ff0159260e1946e9af170d3f4b04cea9a400af93759c49cc5435b2dfed37cbb1b7e9beb98fdd73fa08cc8fd2c1961a966b6245d085e4fb9d3

  • C:\Users\Admin\Desktop\_WHAT_is.html

    Filesize

    8KB

    MD5

    609c6cb286b3bedeae2f3eed79a59ca3

    SHA1

    899c5f60a809e510adc10ad1c0d86135e2997990

    SHA256

    4e5258ada4a78980396701a009868d624726e2f629444f50aa238c23583a4c98

    SHA512

    60f6f8ed2bb032826e4bd7b8a199d3a1f45742d10e3ffcf3f1805e05ec8afd0fbcad815790026c9d45c9d27a6ddf9ed5af6a4492866845a8e5ccfec64b0f7b81

  • memory/656-62-0x00000000001F0000-0x00000000001F5000-memory.dmp

    Filesize

    20KB

  • memory/656-54-0x00000000755A1000-0x00000000755A3000-memory.dmp

    Filesize

    8KB

  • memory/864-73-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-78-0x0000000000405673-mapping.dmp

  • memory/864-64-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-66-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-67-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-69-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-71-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-59-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-75-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-61-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-77-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-81-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-82-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-84-0x00000000001D0000-0x00000000001F7000-memory.dmp

    Filesize

    156KB

  • memory/864-83-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-55-0x0000000000300000-0x0000000000400000-memory.dmp

    Filesize

    1024KB

  • memory/864-87-0x00000000001D0000-0x00000000001F7000-memory.dmp

    Filesize

    156KB

  • memory/864-57-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/864-56-0x0000000000400000-0x000000000133C000-memory.dmp

    Filesize

    15.2MB

  • memory/1804-86-0x0000000000000000-mapping.dmp