Analysis

  • max time kernel
    67s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 07:51

General

  • Target

    3910397f515f826d7da37b04eb9f093f87cce040fe17b7838af8c804b7cf126e.exe

  • Size

    19KB

  • MD5

    4ba2cca4b642b8ae5efd5907a2303d28

  • SHA1

    e2396a5a16fc8f68a341bcb620cf66385297aad1

  • SHA256

    3910397f515f826d7da37b04eb9f093f87cce040fe17b7838af8c804b7cf126e

  • SHA512

    32ebf976134c65082d237dcd6422e2218a84bba274ee55a5186c464f9bd8b2ac388d4a2c5fe8a7388848be7b0d91e11dff638767a00b435f96d65f1abf07da90

  • SSDEEP

    384:GqXxR7MCVsrfiH55OrKI0lq9BdhAGdalo7It4/xolOJN:fxW8iqrOrKI0uduGslo/x

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3910397f515f826d7da37b04eb9f093f87cce040fe17b7838af8c804b7cf126e.exe
    "C:\Users\Admin\AppData\Local\Temp\3910397f515f826d7da37b04eb9f093f87cce040fe17b7838af8c804b7cf126e.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • outlook_win_path
    PID:1032
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\a.bat" "C:\Users\Admin\AppData\Local\Temp\3910397f515f826d7da37b04eb9f093f87cce040fe17b7838af8c804b7cf126e.exe""
      2⤵
      • Deletes itself
      PID:1748
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\a.bat" "C:\Users\Admin\AppData\Local\Temp\3910397f515f826d7da37b04eb9f093f87cce040fe17b7838af8c804b7cf126e.exe""
      2⤵
        PID:836
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:848 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1164

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\a.bat

      Filesize

      38B

      MD5

      1bb08e1de6d8206457ccb5be7eaa90a9

      SHA1

      b895eee036fd4bbf20378b7bf71102fc1bf6de55

      SHA256

      acbe661b5145045fa3f319f23ca6d6043cb176492d2f7bb291880d107ec47d48

      SHA512

      4f905a5dac2249006262e93609428b8bb0305ca65eb61e2fe5e077db3e098e84a6cf4733b2d1a927f2f4ec2c2aa2ee7128b5cb735fb2aa922107612482e44f9a

    • C:\Users\Admin\AppData\Local\Temp\a.bat

      Filesize

      38B

      MD5

      1bb08e1de6d8206457ccb5be7eaa90a9

      SHA1

      b895eee036fd4bbf20378b7bf71102fc1bf6de55

      SHA256

      acbe661b5145045fa3f319f23ca6d6043cb176492d2f7bb291880d107ec47d48

      SHA512

      4f905a5dac2249006262e93609428b8bb0305ca65eb61e2fe5e077db3e098e84a6cf4733b2d1a927f2f4ec2c2aa2ee7128b5cb735fb2aa922107612482e44f9a

    • memory/836-60-0x0000000000000000-mapping.dmp

    • memory/1032-54-0x0000000075601000-0x0000000075603000-memory.dmp

      Filesize

      8KB

    • memory/1032-55-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1032-56-0x0000000000220000-0x0000000000224000-memory.dmp

      Filesize

      16KB

    • memory/1032-61-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1748-57-0x0000000000000000-mapping.dmp