Analysis

  • max time kernel
    1623s
  • max time network
    1627s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    29-06-2022 00:55

General

  • Target

    630501913e1797d2dd91c3441bfac4e0b9e5340a0c3fab018ac3d98136a14006.exe

  • Size

    173KB

  • MD5

    a8b2040f48ba52cab49117636185bdcb

  • SHA1

    084fd006c562cd0a6114018208948f8bfcd0a465

  • SHA256

    630501913e1797d2dd91c3441bfac4e0b9e5340a0c3fab018ac3d98136a14006

  • SHA512

    142d2d128494abf36f6d97590f6ec8881c7ddde559644b5281f8e65582550937192b2499c905285d2c4d0fc65b6e326cf781d917d688fa5e06ecfbdb7a8693df

Score
10/10

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\630501913e1797d2dd91c3441bfac4e0b9e5340a0c3fab018ac3d98136a14006.exe
    "C:\Users\Admin\AppData\Local\Temp\630501913e1797d2dd91c3441bfac4e0b9e5340a0c3fab018ac3d98136a14006.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\630501913e1797d2dd91c3441bfac4e0b9e5340a0c3fab018ac3d98136a14006.exe
      "C:\Users\Admin\AppData\Local\Temp\630501913e1797d2dd91c3441bfac4e0b9e5340a0c3fab018ac3d98136a14006.exe"
      2⤵
      • Sets desktop wallpaper using registry
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_HELP_instructions.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1180
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1180 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:664
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\630501913e1797d2dd91c3441bfac4e0b9e5340a0c3fab018ac3d98136a14006.exe"
        3⤵
        • Deletes itself
        PID:1160
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MKSBXNE5.txt
    Filesize

    608B

    MD5

    59fe1a660f31a164d12988bf0bfb31f1

    SHA1

    5a63305fd8446224697f3504ec812a2437fbded6

    SHA256

    35fe23e9cd03ccef248568dbd7d3ae89de986f652a4bc8047f878bc2122a6cfc

    SHA512

    0f0c0f2145d05fd9f7b697246cd27c9e9330650d17d50641729ed3b94270fc8da208f910389f9e4ca9514e2a90ab5d574726b7b2a5d110d39790e87daf0ca0d3

  • C:\Users\Admin\Desktop\_HELP_instructions.bmp
    Filesize

    3.3MB

    MD5

    9d3616d1aed91f10aadbbc89d7ea3c54

    SHA1

    5c3ebf9369876663068f17e89020c5b85c7a609c

    SHA256

    836bfdf4041881703c0b6849788a800629ec9ad856d5f27229a2b181c3a9c42e

    SHA512

    86d5ec65e0bd96bbaa61a746890eb51947044573a02daa15ef2d870c380fac9dceb898831cc0f5a69c97383929165a8b269c4cca2606caac19a833af6646a6b1

  • C:\Users\Admin\Desktop\_HELP_instructions.html
    Filesize

    9KB

    MD5

    3311ea81a6e152e291b5daec5c9dfcde

    SHA1

    7187032bfd850895d791a46c8008629722ea3477

    SHA256

    f26a441560809f7d1b4dbc2e84f79917eeeafe60c32ffe8febc09c98e5082943

    SHA512

    04dc39df774c229d3b01b4fa7c675fa0196629c612e0ca00994b628334322d992b37bf561c6828cb6597082c3eaca28186b3028629e800004b0247119bce8cfa

  • \Users\Admin\AppData\Local\Temp\nso2271.tmp\System.dll
    Filesize

    11KB

    MD5

    fc3772787eb239ef4d0399680dcc4343

    SHA1

    db2fa99ec967178cd8057a14a428a8439a961a73

    SHA256

    9b93c61c9d63ef8ec80892cc0e4a0877966dca9b0c3eb85555cebd2ddf4d6eed

    SHA512

    79e491ca4591a5da70116114b7fbb66ee15a0532386035e980c9dfe7afb59b1f9d9c758891e25bfb45c36b07afd3e171bac37a86c887387ef0e80b1eaf296c89

  • memory/784-56-0x00000000002F0000-0x00000000002F3000-memory.dmp
    Filesize

    12KB

  • memory/784-59-0x00000000002F0000-0x00000000002F3000-memory.dmp
    Filesize

    12KB

  • memory/784-54-0x0000000076391000-0x0000000076393000-memory.dmp
    Filesize

    8KB

  • memory/1160-64-0x0000000000000000-mapping.dmp
  • memory/2020-61-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/2020-65-0x0000000000430000-0x0000000000456000-memory.dmp
    Filesize

    152KB

  • memory/2020-62-0x0000000000430000-0x0000000000456000-memory.dmp
    Filesize

    152KB

  • memory/2020-60-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/2020-57-0x000000000040560B-mapping.dmp