Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2022, 05:45

General

  • Target

    e92fee641601183e526559797cf6db409215d2421522da4542f1fbe04cef2cef.exe

  • Size

    5.8MB

  • MD5

    31d6acd296ad54208527e195a1c2db0a

  • SHA1

    c92ee848960eef08708859f8fa8dd4fe431dc742

  • SHA256

    e92fee641601183e526559797cf6db409215d2421522da4542f1fbe04cef2cef

  • SHA512

    0f35a784b61669cda8bdd9ced33356cacb178c2b31bfb522ef7bdea6ef71adea7ffa3a21f20e19d141dd6a14a5412b6cd9347312fce73d9a7529ce8c0a30c5d9

  • SSDEEP

    98304:XpJEc6GEXXNMhivux9airoiAnIB1C8bYwJwzN/SFUqGMtuDbJ6:XuGEnNMhxrQtn01C8raN6FPGQuDbJ6

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 8 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e92fee641601183e526559797cf6db409215d2421522da4542f1fbe04cef2cef.exe
    "C:\Users\Admin\AppData\Local\Temp\e92fee641601183e526559797cf6db409215d2421522da4542f1fbe04cef2cef.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" vbscript:createobject("wscript.shell").run("C:\Windows\System32\taskkill.exe /f /im OneLoupe_uc.exe /im POWERPNT.EXE",0)(window.close)
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Windows\SysWOW64\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im OneLoupe_uc.exe /im POWERPNT.EXE
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1400
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" vbscript:createobject("wscript.shell").run("""C:\Program Files\XxjsChoice\信息技术与学科整合\Xxjs_Choice.BAT""",0)(window.close)
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:708
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Program Files\XxjsChoice\信息技术与学科整合\Xxjs_Choice.BAT" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1824
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c subst|find "\:"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:316
          • C:\Windows\SysWOW64\subst.exe
            subst
            5⤵
              PID:776
            • C:\Windows\SysWOW64\find.exe
              find "\:"
              5⤵
                PID:1428
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c net use|find ""
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1988
              • C:\Windows\SysWOW64\net.exe
                net use
                5⤵
                  PID:1620
                • C:\Windows\SysWOW64\find.exe
                  find ""
                  5⤵
                    PID:1612

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\XxjsChoice\信息技术与学科整合\Xxjs_Choice.BAT

            Filesize

            1KB

            MD5

            5480c4985a8dadb6505caa61d662dc10

            SHA1

            1c7ecdc9269644b62350cc45736e46ebbd1a2b16

            SHA256

            5a92926cd685e21a57be43432eff26050cac8dd5440b30978191191089a9e9a4

            SHA512

            e56d3577199eff1e55d481a910a136794da56b4b72f104809751176f9865ac6a91d36bf445e187cf76f63ba1066d89a7f254b834ae68b710ee90e70208fa9540

          • memory/1212-54-0x0000000075E11000-0x0000000075E13000-memory.dmp

            Filesize

            8KB