Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 05:55

General

  • Target

    成人视频聊天室.exe

  • Size

    480KB

  • MD5

    43d3520d750ecee16944203e6a8f55f7

  • SHA1

    629c6160432a89a5f965d4683f9ab24203a6ac09

  • SHA256

    695e272ad08f38397aa5f389ec0caaea4c411c262a1917bc022d9dce2bfa4a93

  • SHA512

    e4f41aacd4a983af3f15b38992ce895861e4f91da40aa3b7cbb52b242ecd7988aaa9ff8372e9a3f099f5028b6eb6ef6fa7fb7b3ef22e61628642a5165622aa90

  • SSDEEP

    12288:6Y4QB7xrclznfNMy1b3yrgQMqA+Wxa+iK:6Y4QB1r8nfeAbisRqFK

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\成人视频聊天室.exe
    "C:\Users\Admin\AppData\Local\Temp\成人视频聊天室.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://123.7dwg.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:108
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1908
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "echo y| cacls "C:\Users\Admin\Desktop\????.url" /p everyone:f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo y"
        3⤵
          PID:1772
        • C:\Windows\SysWOW64\cacls.exe
          cacls "C:\Users\Admin\Desktop\????.url" /p everyone:f
          3⤵
            PID:1564
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "echo y| cacls "C:\Users\Admin\Desktop\????" /p everyone:f"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1508
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo y"
            3⤵
              PID:1320
            • C:\Windows\SysWOW64\cacls.exe
              cacls "C:\Users\Admin\Desktop\????" /p everyone:f
              3⤵
                PID:1356

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1248-56-0x0000000075351000-0x0000000075353000-memory.dmp

            Filesize

            8KB

          • memory/1248-58-0x0000000004890000-0x000000000534A000-memory.dmp

            Filesize

            10.7MB