Analysis

  • max time kernel
    126s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 01:33

General

  • Target

    d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe

  • Size

    139KB

  • MD5

    a679956b0bbf6e98152ba421070153d0

  • SHA1

    e41158d6aa265d60528082cba1586ff32ba29cae

  • SHA256

    d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0

  • SHA512

    2a2ee3d30ac8bbe69b921860703685c296efd2167a84697e8a914e7ec47b11467b2edfdeafddc20c27abc08a850c07d65c9554bdb3b2fc9d29f0804724b08c0d

  • SSDEEP

    3072:s+tBVTCKwmT6ZrAcrBFXa8WuXGCXpORV+3Ot8NxS:bbVuI6Weq8WuXGXL+m8z

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe
    "C:\Users\Admin\AppData\Local\Temp\d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=vsd3g0h_vs0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1016

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          5f0aae443c99da71f04a24c712d90ce2

          SHA1

          bee1b4f0bb8e9e5960458e26893e9a020384318e

          SHA256

          f752f943e5928b60c358126fa271a794db4d4492095fa02b39aa3329043d9234

          SHA512

          068a0b9ac29f4db6963c4741ec56a7c69787953a1eb5ed1f9ac3c12e3feb19953498913311a61203a50d1353da00aed06b1410ab14d0cf014752b986120cbd0e

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

          Filesize

          5KB

          MD5

          bd0f9206f9b68d10aa6877f1f56f18e1

          SHA1

          f1f17af9b9c38b44e069e5f416cd0bfaf8c3d910

          SHA256

          771ccb85f950b27ebb80a50360c17d93b4f2489b4ef2fb464d6aeec7aa43411b

          SHA512

          f0af907578d40c35d3469eade84ce33e6d475f87658d2e2ef446b98e5c8ab2f46b85a53d3049470512faf25ea92d2e8321228b69857985f5f242b270fc0aad9e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ULIFUIR3.txt

          Filesize

          608B

          MD5

          fc1241a7af402c9fc48231bda4c5ad70

          SHA1

          252aa8afc887668f6ca6e46c64cb9eabca19c78e

          SHA256

          a98c7ff70e3522195afb955697b42e2b1897bf3002aca3fba27637885bb16350

          SHA512

          e141bcd1eff2a77cc817f2106b5d5fbe5fff56a7e83908ce9587146c3c117d621840ddb916af0ca6cc4bf27a556011484185c2ecf9cdb6dda2531e59fda64e93

        • memory/1412-54-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB

        • memory/1412-55-0x0000000000270000-0x00000000002B6000-memory.dmp

          Filesize

          280KB

        • memory/1412-58-0x0000000075771000-0x0000000075773000-memory.dmp

          Filesize

          8KB

        • memory/1412-60-0x00000000032D0000-0x0000000003D8A000-memory.dmp

          Filesize

          10.7MB

        • memory/1412-62-0x0000000000270000-0x00000000002B6000-memory.dmp

          Filesize

          280KB

        • memory/1412-61-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB