Analysis

  • max time kernel
    101s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 09:11

General

  • Target

    c632d4f09025187012172cd9c62bcaf81cb5cfc06e14abd800135fc08f7f6003.exe

  • Size

    35KB

  • MD5

    033f7232df32a156a4dd911c9cffd64e

  • SHA1

    766be42eefe8c5211543377f68d8431ee807fd49

  • SHA256

    c632d4f09025187012172cd9c62bcaf81cb5cfc06e14abd800135fc08f7f6003

  • SHA512

    72faa3160cc0669b9e70002d8df218e0a0246c7ed9ef160555bc85045cc25d26463cea6bd674c62da897491f74be77bcfa025c2f3cc895019a2d3160a378bf78

  • SSDEEP

    768:64uZ7MU+VGv7lB0NQQaqVLqQf4dFAqORXRz/ZUXYp7H8FuWX:64E7ku0Ntfqy43VORXB/So5iX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c632d4f09025187012172cd9c62bcaf81cb5cfc06e14abd800135fc08f7f6003.exe
    "C:\Users\Admin\AppData\Local\Temp\c632d4f09025187012172cd9c62bcaf81cb5cfc06e14abd800135fc08f7f6003.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://ju.bigflogger.com.br/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:936

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XE3TG30Z.txt

          Filesize

          608B

          MD5

          cf71d5d9b0aad1cab06c511bd588746d

          SHA1

          ac1bc68a1f15970bbeb75254f43a1f379e334d5a

          SHA256

          90c2f1d01c50835380773fec7bb5dffa656b9de5d62eca67a63bde8173d00e3f

          SHA512

          d8d16ef7137f30333eb9444c7ad81453b722e42a688c74c9de8c60e1625ccca9c4aa83f6fb6d94883e20a42bd71981ab969b368de6813ffcfd6d1e932624e090

        • memory/1536-54-0x0000000075CF1000-0x0000000075CF3000-memory.dmp

          Filesize

          8KB