Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2022, 09:32

General

  • Target

    umaagNllnma.html

  • Size

    792KB

  • MD5

    aa0bb07bb5e703e51786ec44dab22b8d

  • SHA1

    4f3aa8c45281905af663d18a5331ab82cbc86ff1

  • SHA256

    5b3d7924ba151028bf8d35adbc77371084bc0a3aec9e30b0d05ee6584a6d004a

  • SHA512

    bccda7f9a206d7990fccc9ff46e3b65b9e9ebb02f41555d647b1d625dd7f3a98801f13383ef6d39cc8cb1857b8c25bd7bcaa16fbc6ff9309335d49c1857dbbb2

  • SSDEEP

    12288:My6pbKJG1cNTFC8dujWEi+iVWG9P7mkETzWUyUrAQVJ+FBynqfctDRGPAknRx:MPbLGNJTdujWDZhmtxykAQViBghtDatX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\umaagNllnma.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2036
  • C:\Windows\System32\isoburn.exe
    "C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_Art#8878(Sept2622).zip\Art#8878.iso"
    1⤵
      PID:1056
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\Art#8878.iso"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1744
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Art#8878\" -spe -an -ai#7zMap18732:74:7zEvent25933
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1700
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x558
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1056
    • C:\Windows\System32\Notepad.exe
      "C:\Windows\System32\Notepad.exe" C:\Users\Admin\Desktop\Art#8878\banners\interviewedProbability.js
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:2012
    • C:\Windows\System32\NOTEPAD.EXE
      "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Art#8878\banners\commuterFlagon.cmd
      1⤵
        PID:804
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\Art#8878\banners\urbanely.db
        1⤵
          PID:1600

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I9NA5QYV\Art#8878(Sept2622).zip.811kjvl.partial

          Filesize

          592KB

          MD5

          46c005e8c933667941e57c75c52022e7

          SHA1

          04162e57bce21243ed365fa1e02959202c34070c

          SHA256

          e4f5ed0da12a679402a4d09aa1680bf4d640b173960487bb6d3c110a8f0fb5d1

          SHA512

          2dbe61411a0120506c14acbabb1df9ac71a317f38ccc7bf3b40afa9803afbcf156c211a9e12fcb90466938506459df9bc54e5deee962c51a22972acf0a5d04dd

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5UZS3LXH.txt

          Filesize

          608B

          MD5

          7a5663699c186b7749ebf993c01f19e9

          SHA1

          53ef28994c04db1c475fde7546ae25155283b02d

          SHA256

          78a0526d725aa8bed763187ea4c90df0768f4a9786c071da1c2e2e198d9de6b9

          SHA512

          39e24285b81e9dbb400bac7554c5f95c8596401d674beefacb86de41ab7a159f7b27ad473eabd426764fc7383d513471f5b18054830c1db131c71da1cf2cbccb

        • C:\Users\Admin\Desktop\Art#8878\banners\commuterFlagon.cmd

          Filesize

          44B

          MD5

          4ea3b2be6956e9051290b28ea057f59d

          SHA1

          9ed4ec2d77d89fcd6734558ffda49f215366ddcb

          SHA256

          57369dfd2b2123951c3c4b5bff3ab9995e395469eb60e318544e54d2db1bd33b

          SHA512

          c525fad16f5e44ce09067ab56326303a966da10de068785b35d723623c361011bbbda3d0fb8b13756060bedcbbc186bc5963c72bd5eb7a0013cae53bbd1dc357

        • C:\Users\Admin\Desktop\Art#8878\banners\interviewedProbability.js

          Filesize

          221B

          MD5

          876179df2cec275629379ed330131c1c

          SHA1

          fcb114c9d5da8ebb8c01cca878f56c803fec63fd

          SHA256

          ac9a91d9401c8a1c961c3aa67d6b9494eb00fccf5e04096e50628c2dbd5fe89f

          SHA512

          7d3331013df42473e6c722ac5e0546f854f6d59697363fbcef7cd42aa8c2e797ca7258021c849077dc8383da06f6c861b57db98b8510bf8c06a5feecd1e11af0

        • memory/1056-55-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmp

          Filesize

          8KB