Analysis

  • max time kernel
    67s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2022, 10:09

General

  • Target

    http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ac2lvn64s7f5lpkdepqds4xz7ina_29.5/imefjhfbkmcmebodilednhmaccmincoa_29.5_win_jh7q2vuithpfj4nzyqie45weie.crx3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 13 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ac2lvn64s7f5lpkdepqds4xz7ina_29.5/imefjhfbkmcmebodilednhmaccmincoa_29.5_win_jh7q2vuithpfj4nzyqie45weie.crx3
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1740
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\imefjhfbkmcmebodilednhmaccmincoa_29.5_win_jh7q2vuithpfj4nzyqie45weie.crx3
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1296
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\imefjhfbkmcmebodilednhmaccmincoa_29.5_win_jh7q2vuithpfj4nzyqie45weie.crx3
        3⤵
          PID:836
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\imefjhfbkmcmebodilednhmaccmincoa_29.5_win_jh7q2vuithpfj4nzyqie45weie.crx3
        2⤵
          PID:1596
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\imefjhfbkmcmebodilednhmaccmincoa_29.5_win_jh7q2vuithpfj4nzyqie45weie.crx3
          2⤵
            PID:1320
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\imefjhfbkmcmebodilednhmaccmincoa_29.5_win_jh7q2vuithpfj4nzyqie45weie (1).crx3
            2⤵
              PID:1712
            • C:\Windows\system32\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\imefjhfbkmcmebodilednhmaccmincoa_29.5_win_jh7q2vuithpfj4nzyqie45weie (1).crx3
              2⤵
              • Opens file in notepad (likely ransom note)
              PID:1404

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FX84LLCA.txt

                  Filesize

                  607B

                  MD5

                  2fd33e9c8db20c51bb63224fb8a96875

                  SHA1

                  110bbebdf82fe647fe5bd3dcada989db5159d91a

                  SHA256

                  05f7bdf36e07ed4df7a82da19f9fb53afcc6fd22fa2d43687ed490816e83f120

                  SHA512

                  707400e4e555e3891e9f8864a09e453d536de99f96da9867b7d5fc90cf3ea6eb09838a91bb3273553c2686acd7a8b30c2719f1c804690ae78810d304580b2ff5

                • C:\Users\Admin\Downloads\imefjhfbkmcmebodilednhmaccmincoa_29.5_win_jh7q2vuithpfj4nzyqie45weie (1).crx3

                  Filesize

                  2.4MB

                  MD5

                  fc698d259830c3afb1196cf31af77793

                  SHA1

                  d825c924bdaed55bbd5149488b5520dc6772a460

                  SHA256

                  d63a8455583691741392f5ddca600bb71affa34c25af5c1bbe4fb197d353344a

                  SHA512

                  d27907e4adc3066704ac447b9742887ce7d2b2cdad69772971fd1246a4e3b8b63f6b45010ac300eb5ea0c6018e926bbd03e35328b674664ddf9ec37494d0b56f

                • C:\Users\Admin\Downloads\imefjhfbkmcmebodilednhmaccmincoa_29.5_win_jh7q2vuithpfj4nzyqie45weie.crx3.8y7pvv2.partial

                  Filesize

                  2.4MB

                  MD5

                  fc698d259830c3afb1196cf31af77793

                  SHA1

                  d825c924bdaed55bbd5149488b5520dc6772a460

                  SHA256

                  d63a8455583691741392f5ddca600bb71affa34c25af5c1bbe4fb197d353344a

                  SHA512

                  d27907e4adc3066704ac447b9742887ce7d2b2cdad69772971fd1246a4e3b8b63f6b45010ac300eb5ea0c6018e926bbd03e35328b674664ddf9ec37494d0b56f

                • memory/1296-56-0x000007FEFB751000-0x000007FEFB753000-memory.dmp

                  Filesize

                  8KB