Analysis

  • max time kernel
    135s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 22:06

General

  • Target

    1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe

  • Size

    14KB

  • MD5

    71476ee7b998c7905bcce089c184af17

  • SHA1

    773a93cb299aa3bd84b29cda2809d6482b2d808c

  • SHA256

    1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e

  • SHA512

    d925f1d54077a78b1898eb7179982bfcb6800822ddf4ed7860e12a486abb1b7b8ef1d2c7a33fd634fc052186aed1860418f7bfc2e036f3e99a15ba92eb3b7f57

  • SSDEEP

    384:c7Jn8r3Jyv0Kq7NJcAb6q40xs5QuJ1L57U5:2Jn6Zyv0DcDq4IHuzLVi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe
    "C:\Users\Admin\AppData\Local\Temp\1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://a.doginhispen.com/150/in/htmlg2422822176.html?cid=51280403&aid=10383&time=2422822176&fw=64&v=150&m=0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:396 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    fd70739fca5345a28f924f9102ae10ee

    SHA1

    6ce3f92183544f3bf52cb76364591589cb940a19

    SHA256

    f238404cc643efddef8ff430f128cdc8ec1513969eaac24b5e5bce81248a91e7

    SHA512

    a787d3a2bceeaed2f2a29f357df6ae17d5b9f66a3c561550d5f83c308ad26a1ddf876488151ff5e51ce93bfb9d0c7b8ca812d595e8d3ebdda7d805707ac1b278

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    5f0a13237cf0e284456b6f34553efe4f

    SHA1

    4de1d275496ab53340cdc1467ea8425f6c3473a7

    SHA256

    8483dbacb63fedd1e1cefd4a13a86111c208bf6d3a0aaeb12f67429f0911ba10

    SHA512

    b90fdbff97f40d33a81ca743a807b35dc1887b6a3e296fae597a278f95b1e51dc59477cbe0918415b082596e7009b9d34eacc7e609b8782908b1d8ccdf541b46