Analysis

  • max time kernel
    90s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2022, 19:35

General

  • Target

    ONLY 1 DOWNLOAD TO GET IT - Linkvertise Downloader_7e-uOh1.exe

  • Size

    4.2MB

  • MD5

    10d7d23803e91f86c420ae88ea275f0d

  • SHA1

    e64aebdf96d7f70d2321bb9076015af25e6e7d43

  • SHA256

    f91dbc07409b57e5261f3a9d6a4f80e87e12b73b0c0579519ed237a0e39dd3b4

  • SHA512

    f6f894c482ce8c794369cf9ebfcb32dc72fb46da0cfc7142c91bd0291235fd4727456153baf6087b5fb65547fc8df9cb888c3873c897020023e3ef13ce6606ae

  • SSDEEP

    98304:oSi/6hoXOWZ3lsuUxqxgWphfHLx137O5K:boXOM1ughP7SK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ONLY 1 DOWNLOAD TO GET IT - Linkvertise Downloader_7e-uOh1.exe
    "C:\Users\Admin\AppData\Local\Temp\ONLY 1 DOWNLOAD TO GET IT - Linkvertise Downloader_7e-uOh1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\AppData\Local\Temp\is-B5AFH.tmp\ONLY 1 DOWNLOAD TO GET IT - Linkvertise Downloader_7e-uOh1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-B5AFH.tmp\ONLY 1 DOWNLOAD TO GET IT - Linkvertise Downloader_7e-uOh1.tmp" /SL5="$60120,3461204,1235456,C:\Users\Admin\AppData\Local\Temp\ONLY 1 DOWNLOAD TO GET IT - Linkvertise Downloader_7e-uOh1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://s3.eu-central-1.amazonaws.com/adlocis.linkvertise.links/pastes/39515526.txt?X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA6L5L3NKTBHJ3YVHU/20220928/eu-central-1/s3/aws4_request&X-Amz-Date=20220928T193457Z&X-Amz-SignedHeaders=host&X-Amz-Expires=432000&X-Amz-Signature=de9d9001429d9fb56edb284dfbe14e78265c0a041766e13991dad900ab1ce715
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1300
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75d8671aba65c741ab43a99a34162b7c

    SHA1

    1fa7ea934f85b748a71b4e80178f229338229422

    SHA256

    a7f5cf391e6e2f92eb4972cdc4d36fe7e9985ad1e2e9c5acfd8658fbf99e4019

    SHA512

    53aa6638e84f518c71d53e0575b7971d30d21cc606deaa64e022292410cc719e9f4b03accf96269240acd02174376b99bca7db21c879df293760aee9fa16836b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    247ff674be8caf1e511c677947030850

    SHA1

    5e0ce8ed35429664297309034c8c880d93b78f62

    SHA256

    dff6f65dfba09f3b27c46f7238bcf3e3289782731e781d3792cff74e62c107ac

    SHA512

    38e4daab897b4d17bc428b151d3fead85438c0de73a3a17587e17001605ab9ce4c8007db83965cd2cbc84e83b0f76e3d17f4f12ee5872c7492dae10175b9916e

  • C:\Users\Admin\AppData\Local\Temp\is-B5AFH.tmp\ONLY 1 DOWNLOAD TO GET IT - Linkvertise Downloader_7e-uOh1.tmp

    Filesize

    3.4MB

    MD5

    06e087e48e6d73efd7f353855aacb570

    SHA1

    679e2a92aa2c8a09fa3b615d56e48667ff8bb4f8

    SHA256

    9a0815e309db4d6feebf90ce5e91cc78892b2016dcbe07fd436afd655477320d

    SHA512

    05e4fe70aa104a4edbbdddf5e7396446d67123e2865c3a02c414a39c1ee6dc34aba6fa6f587435755a9a90ade1b7eccefe0e76244563689e0971a024049086c2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\P8ZTI1NW.txt

    Filesize

    606B

    MD5

    e976c4616e12afd2d077c8205ac46a9e

    SHA1

    cd722363db432bbcc1b37cf55529c3073b3e9e42

    SHA256

    bd1ab47efe9b8c0fbf332f531c17a84e0c48a561f4b51eb1d5381aeaec481d7d

    SHA512

    3fa87844fd8147e10253ddc258ea5b29cfe5883db04fc95ce57ee381a8e14a8a0b1578683fb147ccff0b8ebf69fcbb5b849ec92a5d99fba211b398197dfd55b1

  • \Users\Admin\AppData\Local\Temp\is-B5AFH.tmp\ONLY 1 DOWNLOAD TO GET IT - Linkvertise Downloader_7e-uOh1.tmp

    Filesize

    3.4MB

    MD5

    06e087e48e6d73efd7f353855aacb570

    SHA1

    679e2a92aa2c8a09fa3b615d56e48667ff8bb4f8

    SHA256

    9a0815e309db4d6feebf90ce5e91cc78892b2016dcbe07fd436afd655477320d

    SHA512

    05e4fe70aa104a4edbbdddf5e7396446d67123e2865c3a02c414a39c1ee6dc34aba6fa6f587435755a9a90ade1b7eccefe0e76244563689e0971a024049086c2

  • \Users\Admin\AppData\Local\Temp\is-KUCQU.tmp\AppUtils.dll

    Filesize

    1.8MB

    MD5

    43ce6d593abd5141a3139603f352ae05

    SHA1

    a97c75e23d275dddfde15ef5fdf3ff3253c0992c

    SHA256

    94e874f2702ea6be50e7d74864b66e7f763449c3db237803f3fad6adfd64ed3d

    SHA512

    bfc527529e5f73ba190dfc5bd043175c7e2ae963b665d6d39421c29e025020f1d593dc88b7bee33d86ef6b4f7a4c5e1a0339df4e99cab6849a275d1dda9f439f

  • \Users\Admin\AppData\Local\Temp\is-KUCQU.tmp\DimensionUtils.dll

    Filesize

    1.9MB

    MD5

    ce2dc2cc12aec529511da19cf63ba802

    SHA1

    5b45c33a34df73920077f546176a3aa96df0f80e

    SHA256

    bde7cc0193ad2fbdfa9f072d9003bf1c82cd27e027b2e038343514f8cc8ee6d2

    SHA512

    98b5017e437b05639238b63bdf6cccdea7665f3fa0c55e87e8c7139551c213b1a63d641d588b950346ec66bb03b4800dc4e3dd4c60f80e0e76779b1ba58d2be7

  • \Users\Admin\AppData\Local\Temp\is-KUCQU.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • memory/956-64-0x00000000077A0000-0x00000000077AF000-memory.dmp

    Filesize

    60KB

  • memory/956-67-0x0000000074001000-0x0000000074003000-memory.dmp

    Filesize

    8KB

  • memory/1488-66-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/1488-68-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/1488-54-0x0000000075AD1000-0x0000000075AD3000-memory.dmp

    Filesize

    8KB

  • memory/1488-60-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/1488-55-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB