Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 14:05

General

  • Target

    1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe

  • Size

    122KB

  • MD5

    53ebe3efa9bdad1a2af74252ccf19bd2

  • SHA1

    74e3bea45a504edd34ac009c5abcc56f477617b9

  • SHA256

    1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a

  • SHA512

    6f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b

  • SSDEEP

    3072:TAY9SuJNW8CZ+zTyxvJ530A3RAVavmyKoSiZBtJ:TPX69ZMyxx5kA3RAVauZoSiZ7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 7 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe
    "C:\Users\Admin\AppData\Local\Temp\1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer Protected Mode
    • Modifies Internet Explorer Protected Mode Banner
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\ProgramData\VVf83d6c.exe
      "C:\ProgramData\VVf83d6c.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      PID:1480
    • C:\Users\Admin\AppData\Local\Temp\1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe
      "C:\Users\Admin\AppData\Local\Temp\1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe"
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\ProgramData\VVf83d6c.exe
        "C:\ProgramData\VVf83d6c.exe"
        3⤵
        • Executes dropped EXE
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        PID:1944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\VVf83d6c.exe

    Filesize

    122KB

    MD5

    53ebe3efa9bdad1a2af74252ccf19bd2

    SHA1

    74e3bea45a504edd34ac009c5abcc56f477617b9

    SHA256

    1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a

    SHA512

    6f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b

  • C:\ProgramData\VVf83d6c.exe

    Filesize

    122KB

    MD5

    53ebe3efa9bdad1a2af74252ccf19bd2

    SHA1

    74e3bea45a504edd34ac009c5abcc56f477617b9

    SHA256

    1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a

    SHA512

    6f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b

  • C:\ProgramData\VVf83d6c.exe

    Filesize

    122KB

    MD5

    53ebe3efa9bdad1a2af74252ccf19bd2

    SHA1

    74e3bea45a504edd34ac009c5abcc56f477617b9

    SHA256

    1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a

    SHA512

    6f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b

  • \ProgramData\VVf83d6c.exe

    Filesize

    122KB

    MD5

    53ebe3efa9bdad1a2af74252ccf19bd2

    SHA1

    74e3bea45a504edd34ac009c5abcc56f477617b9

    SHA256

    1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a

    SHA512

    6f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b

  • \ProgramData\VVf83d6c.exe

    Filesize

    122KB

    MD5

    53ebe3efa9bdad1a2af74252ccf19bd2

    SHA1

    74e3bea45a504edd34ac009c5abcc56f477617b9

    SHA256

    1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a

    SHA512

    6f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b

  • \ProgramData\VVf83d6c.exe

    Filesize

    122KB

    MD5

    53ebe3efa9bdad1a2af74252ccf19bd2

    SHA1

    74e3bea45a504edd34ac009c5abcc56f477617b9

    SHA256

    1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a

    SHA512

    6f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b

  • memory/1148-55-0x00000000001B0000-0x00000000001F6000-memory.dmp

    Filesize

    280KB

  • memory/1148-54-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1148-56-0x0000000074C11000-0x0000000074C13000-memory.dmp

    Filesize

    8KB

  • memory/1148-57-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1148-62-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1148-69-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1480-67-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1480-66-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1480-64-0x0000000000220000-0x0000000000266000-memory.dmp

    Filesize

    280KB

  • memory/1480-63-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1744-70-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1744-71-0x0000000000450000-0x0000000000496000-memory.dmp

    Filesize

    280KB

  • memory/1744-74-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1744-78-0x0000000002770000-0x00000000027B6000-memory.dmp

    Filesize

    280KB

  • memory/1944-80-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB