Analysis

  • max time kernel
    126s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 13:45

General

  • Target

    c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe

  • Size

    67KB

  • MD5

    409ea944e54b81d80ea7f859c89a9682

  • SHA1

    d30b01947275d5e89b1a35c2a2077b416e8522be

  • SHA256

    c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2

  • SHA512

    7709905143bb2e3349b80e62a2e0b8a08d9c97256061f21ee6852e6eb0d8df4bd2c5415ff649a3ce46fe9d2427f7692be5cfe742b1128855742c9c530dcf6976

  • SSDEEP

    768:HTRF+gPaZbKyj9lFaGmx/gAmO1s04N/4aklbISfhaGDgVm75/dWWyXYrfGWDbX0t:HtNyMyhl5fAVs06/4a0k+H1lyIVDLTW

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe
    "C:\Users\Admin\AppData\Local\Temp\c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=ZvizXaqutWM
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    845085b97ac53320f34892b96634cdac

    SHA1

    b17ff3542e93ea18feeb996add3e4ddc588e0813

    SHA256

    b1c9b56489bcc0e3bf4d8babbd4da5cc0a13c5d48104b5b30b858fabecb63a0b

    SHA512

    20f5be124be270dc9da6336781b1644848e227fba8f687df8f69ee00e55b62368dd835fedcbf22ce0ca023699dd5aff72b7f19bb2b11397904e2d619db816f89

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    5KB

    MD5

    48ac26d7fb09679abc27dd8f2178a25a

    SHA1

    3bdba18530016de7775a20911b4edde4f1c7dcd3

    SHA256

    91a4618448ad515f6af89a4dcb1d7216ea12f9077e9e4b1a5f945429d99cb9fe

    SHA512

    7cb4d766eb3209757401c47ff698ee6151ee4e7e242113c62140c82a939d1d8c6d829fb87b9d66381fd9d63c7d7cafa6591e6cf783f16a30e9e15174307a0f35

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KBFJADFE.txt

    Filesize

    603B

    MD5

    f5148b82a55d74de4fab986b0004dbca

    SHA1

    2a184e4f49f5e53a220bc3b42c0606996395de90

    SHA256

    e9d70152ba71ef216bcdba24de96137ec37b04e3362a33a0e1479eeb76caaa12

    SHA512

    6b9ea4203ca3cc49e283de1603ca1be4558359ac9a5c89efbf64655ffb2376ce44ce67dec9749050e42d0979d4e1b3a6d886ed9baabe0b11d4a16231045e3dc7

  • memory/1644-54-0x0000000000400000-0x0000000000440DC5-memory.dmp

    Filesize

    259KB

  • memory/1644-58-0x0000000000400000-0x0000000000440DC5-memory.dmp

    Filesize

    259KB

  • memory/1644-59-0x0000000075E31000-0x0000000075E33000-memory.dmp

    Filesize

    8KB

  • memory/1644-60-0x0000000000400000-0x0000000000440DC5-memory.dmp

    Filesize

    259KB