Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 07:47

General

  • Target

    4cc59e2aaf2bd819cb76e5e4dd14a9d361679e798f18e5360db8b00ad759f47a.exe

  • Size

    706KB

  • MD5

    2def3b86e7117c6e78b333be209769b9

  • SHA1

    2842267899c476e87f40de88c5f07590bc0c94e8

  • SHA256

    4cc59e2aaf2bd819cb76e5e4dd14a9d361679e798f18e5360db8b00ad759f47a

  • SHA512

    d22dfd9cf08ac9141cbcccb358f87bdfb4a385520df23f2e297c37b8f742bdfbd9ab299392ea2cf8c8926d14cb5f326e5819190e43ab8d2b0d5150a8111907da

  • SSDEEP

    12288:gp/iN/mlVdtvrYeyZJf7kPK+iqBZn+D73iKHeGspT4IeAYE5DLam:gpQ/6trYlvYPK+lqD73TeGsp9YEgm

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cc59e2aaf2bd819cb76e5e4dd14a9d361679e798f18e5360db8b00ad759f47a.exe
    "C:\Users\Admin\AppData\Local\Temp\4cc59e2aaf2bd819cb76e5e4dd14a9d361679e798f18e5360db8b00ad759f47a.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies Control Panel
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\ScrBlaze.scr
      "C:\Windows\ScrBlaze.scr" /S
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:1780

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PBCQO8KM.txt

          Filesize

          74B

          MD5

          909c19eae150c21d9b3fc1ef9e741fe3

          SHA1

          7e8c63dbbbfe98c5021ee786c9c92136bad04563

          SHA256

          a8d6959648504667aa08b0462dcd76949f61519df7745912f52541aa9e319cbc

          SHA512

          f733cff95f43f3fa657e9c07aa76a28f5e2b5b80774a257e5b78b863962d73017cd4b8f3178fbab7c40f15294efcc1dce8b0ae1525abe21fbb16134376b2a7d8

        • C:\Windows\ScrBlaze.scr

          Filesize

          706KB

          MD5

          2def3b86e7117c6e78b333be209769b9

          SHA1

          2842267899c476e87f40de88c5f07590bc0c94e8

          SHA256

          4cc59e2aaf2bd819cb76e5e4dd14a9d361679e798f18e5360db8b00ad759f47a

          SHA512

          d22dfd9cf08ac9141cbcccb358f87bdfb4a385520df23f2e297c37b8f742bdfbd9ab299392ea2cf8c8926d14cb5f326e5819190e43ab8d2b0d5150a8111907da

        • C:\Windows\ScrBlaze.scr

          Filesize

          706KB

          MD5

          2def3b86e7117c6e78b333be209769b9

          SHA1

          2842267899c476e87f40de88c5f07590bc0c94e8

          SHA256

          4cc59e2aaf2bd819cb76e5e4dd14a9d361679e798f18e5360db8b00ad759f47a

          SHA512

          d22dfd9cf08ac9141cbcccb358f87bdfb4a385520df23f2e297c37b8f742bdfbd9ab299392ea2cf8c8926d14cb5f326e5819190e43ab8d2b0d5150a8111907da

        • C:\Windows\s18273659

          Filesize

          970B

          MD5

          9c6542c154fce8fca87aed7a6602405c

          SHA1

          ef2e7b6425bbe7a2bc1dca1abc2c0af5d73d7b37

          SHA256

          b2f435cdd2a066a8ab18cf5336b2a2a6a62961121c8be450416db022bb18b612

          SHA512

          37ed15be39f5970110765cb5cc3077a0a0c8fd796e3e06379208319a64b1b6cb06b0794e4bfe285fe0d761d4c66937620ac5f12f9d81aba6f89a210e246fcf41

        • memory/1088-54-0x0000000074C91000-0x0000000074C93000-memory.dmp

          Filesize

          8KB