Analysis

  • max time kernel
    75s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 23:41

General

  • Target

    fc75c547e4a0d860b7571d1a98392f349e7d34b428daea146eb084d17fe20ff3.exe

  • Size

    1.0MB

  • MD5

    0373ea59511eb9c350331fe968f071c4

  • SHA1

    fc4a94642b9d4c87638f518c303d0ff1f70d1ced

  • SHA256

    fc75c547e4a0d860b7571d1a98392f349e7d34b428daea146eb084d17fe20ff3

  • SHA512

    1acc757de31e47aa8255e4eab3c455d81d664e7c629afa59f2161d1292d056920da269c6e5b383790c05176131f7c5c20a7e2a31b9e03e8bd57d2601863b4897

  • SSDEEP

    24576:bzM2CC6SUmunH67nOs6qMPwvutzfAz3yyv6k4pj0ISQA6q:UfSMnH67n8dtzryyPZ0rQA6q

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc75c547e4a0d860b7571d1a98392f349e7d34b428daea146eb084d17fe20ff3.exe
    "C:\Users\Admin\AppData\Local\Temp\fc75c547e4a0d860b7571d1a98392f349e7d34b428daea146eb084d17fe20ff3.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.yftk.cc/?000
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4692
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.yftk.cc/?000
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4668
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4668 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3272
    • C:\Program Files (x86)\soft911\Green.exe
      "C:\Program Files (x86)\soft911\Green.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Users\Admin\AppData\Local\Temp\is-A4GQ3.tmp\Green.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-A4GQ3.tmp\Green.tmp" /SL5="$A004E,744477,52224,C:\Program Files (x86)\soft911\Green.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:812
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\soft911\Green.exe"" /sp- /VERYSILENT /norestart
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4368
          • C:\Program Files (x86)\soft911\Green.exe
            "C:\Program Files (x86)\soft911\Green.exe" /sp- /VERYSILENT /norestart
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4080
            • C:\Users\Admin\AppData\Local\Temp\is-PGI63.tmp\Green.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-PGI63.tmp\Green.tmp" /SL5="$10204,744477,52224,C:\Program Files (x86)\soft911\Green.exe" /sp- /VERYSILENT /norestart
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              PID:4720
    • C:\Program Files (x86)\soft911\sunf3.exe
      "C:\Program Files (x86)\soft911\sunf3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1560
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\temg_tmp2.bat"
      2⤵
        PID:5112

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\soft911\Green.exe

            Filesize

            978KB

            MD5

            75118f81630ee2b577cb5919b2a29ebc

            SHA1

            19820eea91cc2bb1c485c32902f72018f4004a93

            SHA256

            862449bb6b01862b60f82b391e4eac07c77a3afc4ccb6b86ccb2edc33ff9197a

            SHA512

            158ea61d8e474fd1c3cca44bb6eb3eba48883b4f570a6ad07f18057b035aa7af4c016747d83a814d6aafe1ca0aa114a72b221481e1b04ae8ccc290747ffc032a

          • C:\Program Files (x86)\soft911\Green.exe

            Filesize

            978KB

            MD5

            75118f81630ee2b577cb5919b2a29ebc

            SHA1

            19820eea91cc2bb1c485c32902f72018f4004a93

            SHA256

            862449bb6b01862b60f82b391e4eac07c77a3afc4ccb6b86ccb2edc33ff9197a

            SHA512

            158ea61d8e474fd1c3cca44bb6eb3eba48883b4f570a6ad07f18057b035aa7af4c016747d83a814d6aafe1ca0aa114a72b221481e1b04ae8ccc290747ffc032a

          • C:\Program Files (x86)\soft911\Green.exe

            Filesize

            978KB

            MD5

            75118f81630ee2b577cb5919b2a29ebc

            SHA1

            19820eea91cc2bb1c485c32902f72018f4004a93

            SHA256

            862449bb6b01862b60f82b391e4eac07c77a3afc4ccb6b86ccb2edc33ff9197a

            SHA512

            158ea61d8e474fd1c3cca44bb6eb3eba48883b4f570a6ad07f18057b035aa7af4c016747d83a814d6aafe1ca0aa114a72b221481e1b04ae8ccc290747ffc032a

          • C:\Program Files (x86)\soft911\setup_2205.exe

            Filesize

            2B

            MD5

            01fb75890201f9c70ac11c06f32245df

            SHA1

            da34a929f4c5f938fb8c2f00419bca1d232a38fd

            SHA256

            2f01629479bfb3bc9e07b3c050c5728324207a3c19fc1fd5f850cf75cd6a8f9c

            SHA512

            44d3bb4bda8c237086411b0ad7f0b5ac6cd743c67aea0a2eab3e3ff5314dc02768e88d8d936161bc71bde340ffd6856ea2305c3712e97567d1512f8f8158fce9

          • C:\Program Files (x86)\soft911\sunf3.exe

            Filesize

            40KB

            MD5

            87730a2424bc90141d6fd85e2161763e

            SHA1

            1ccf9da7cc09ac2484164d342a68d2dbf080b59c

            SHA256

            22d0bcfb872080641aa6d90c990c3b7e184d2f7f61fd91c5be133e4a74d8c0e7

            SHA512

            e1d64bc6828798f51738ecbc9afb5a8d6f6cfcecc031b7c12286f6f9822545f4bd5398563ed71581acc1f086e343f458327acac94f8fa62d746eb49606a3c099

          • C:\Program Files (x86)\soft911\sunf3.exe

            Filesize

            40KB

            MD5

            87730a2424bc90141d6fd85e2161763e

            SHA1

            1ccf9da7cc09ac2484164d342a68d2dbf080b59c

            SHA256

            22d0bcfb872080641aa6d90c990c3b7e184d2f7f61fd91c5be133e4a74d8c0e7

            SHA512

            e1d64bc6828798f51738ecbc9afb5a8d6f6cfcecc031b7c12286f6f9822545f4bd5398563ed71581acc1f086e343f458327acac94f8fa62d746eb49606a3c099

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            471B

            MD5

            046bedf3b97e782edc5343dc24a1c485

            SHA1

            ebad04906d01fdb00719463e729f201a043433ae

            SHA256

            4bb13178dccf62921053ef1b62f9bdb994dfd0520741873a60ac2c1484df78ca

            SHA512

            18203014488892166d7c331f8239c1c030fd9831b8040d51b3fdf3d887f867380ff639ccac26e8751b7b13d1dc83e2931f96019783695e7a93c4348046c9fabf

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            404B

            MD5

            e079dfc124cfe6801c007d0d13b2f7a2

            SHA1

            116013aa5ec927a807d91d7f83982c6cb817de69

            SHA256

            94dfcd7bdebc057e6e4ec46a195e9bf0084a00aa9ab0b1bb92a6bc663674e830

            SHA512

            c8eb06f5844eea312f1e63b198a7a8712f338cd171d58ea5ba34bb92e8ac04be71b3eac0f6da04412de05c87a17537d839eb8756d00b2088505bd2b61b892b87

          • C:\Users\Admin\AppData\Local\Temp\is-3I9GH.tmp\_isetup\_isdecmp.dll

            Filesize

            13KB

            MD5

            a813d18268affd4763dde940246dc7e5

            SHA1

            c7366e1fd925c17cc6068001bd38eaef5b42852f

            SHA256

            e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

            SHA512

            b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

          • C:\Users\Admin\AppData\Local\Temp\is-3I9GH.tmp\_isetup\_isdecmp.dll

            Filesize

            13KB

            MD5

            a813d18268affd4763dde940246dc7e5

            SHA1

            c7366e1fd925c17cc6068001bd38eaef5b42852f

            SHA256

            e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

            SHA512

            b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

          • C:\Users\Admin\AppData\Local\Temp\is-5FQP4.tmp\_isetup\_isdecmp.dll

            Filesize

            13KB

            MD5

            a813d18268affd4763dde940246dc7e5

            SHA1

            c7366e1fd925c17cc6068001bd38eaef5b42852f

            SHA256

            e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

            SHA512

            b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

          • C:\Users\Admin\AppData\Local\Temp\is-5FQP4.tmp\_isetup\_isdecmp.dll

            Filesize

            13KB

            MD5

            a813d18268affd4763dde940246dc7e5

            SHA1

            c7366e1fd925c17cc6068001bd38eaef5b42852f

            SHA256

            e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

            SHA512

            b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

          • C:\Users\Admin\AppData\Local\Temp\is-A4GQ3.tmp\Green.tmp

            Filesize

            707KB

            MD5

            bf6be714c784b9157099cbc15df5b38a

            SHA1

            20303eec37cf9c7277a3f42ea4c74dc35fcb31e3

            SHA256

            40ea597e3a3825c9ccb672f00f6229991914e03b9fd66aa7898ef3dcc255bafe

            SHA512

            c5c8097465d1418ffc6806c0f5c4a21277042580975bc0bc1153e5245bbcfcc11ef13d6ef001a1b613910da2abdf452a5432488f7ff3fdd6ca1450006f75cb0d

          • C:\Users\Admin\AppData\Local\Temp\is-A4GQ3.tmp\Green.tmp

            Filesize

            707KB

            MD5

            bf6be714c784b9157099cbc15df5b38a

            SHA1

            20303eec37cf9c7277a3f42ea4c74dc35fcb31e3

            SHA256

            40ea597e3a3825c9ccb672f00f6229991914e03b9fd66aa7898ef3dcc255bafe

            SHA512

            c5c8097465d1418ffc6806c0f5c4a21277042580975bc0bc1153e5245bbcfcc11ef13d6ef001a1b613910da2abdf452a5432488f7ff3fdd6ca1450006f75cb0d

          • C:\Users\Admin\AppData\Local\Temp\is-PGI63.tmp\Green.tmp

            Filesize

            707KB

            MD5

            bf6be714c784b9157099cbc15df5b38a

            SHA1

            20303eec37cf9c7277a3f42ea4c74dc35fcb31e3

            SHA256

            40ea597e3a3825c9ccb672f00f6229991914e03b9fd66aa7898ef3dcc255bafe

            SHA512

            c5c8097465d1418ffc6806c0f5c4a21277042580975bc0bc1153e5245bbcfcc11ef13d6ef001a1b613910da2abdf452a5432488f7ff3fdd6ca1450006f75cb0d

          • C:\Users\Admin\AppData\Local\Temp\is-PGI63.tmp\Green.tmp

            Filesize

            707KB

            MD5

            bf6be714c784b9157099cbc15df5b38a

            SHA1

            20303eec37cf9c7277a3f42ea4c74dc35fcb31e3

            SHA256

            40ea597e3a3825c9ccb672f00f6229991914e03b9fd66aa7898ef3dcc255bafe

            SHA512

            c5c8097465d1418ffc6806c0f5c4a21277042580975bc0bc1153e5245bbcfcc11ef13d6ef001a1b613910da2abdf452a5432488f7ff3fdd6ca1450006f75cb0d

          • C:\Users\Admin\AppData\Local\Temp\nsxB58A.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nsxB58A.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nsxB58A.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nsxB58A.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nsxB58A.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nsxB58A.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nsxB58A.tmp\System.dll

            Filesize

            11KB

            MD5

            00a0194c20ee912257df53bfe258ee4a

            SHA1

            d7b4e319bc5119024690dc8230b9cc919b1b86b2

            SHA256

            dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

            SHA512

            3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

          • C:\Users\Admin\AppData\Local\Temp\temg_tmp2.bat

            Filesize

            456B

            MD5

            77237cc65e83f66e75e1469004fbe823

            SHA1

            b47e36ce9c88ecd8e48de4f96a26ccc450f13f08

            SHA256

            b16b1807afa50a455d48a554f522b37f0faa479b66b943b336cc5c589a14b189

            SHA512

            490618bbf7925234017e03841078b32c05d53482246b383e8f8b63897945bceeeca1d8c660e9ace8173629716925c86870422b7b9ea49ade40ba89a1414253d6

          • memory/812-144-0x00000000023C1000-0x00000000023C3000-memory.dmp

            Filesize

            8KB

          • memory/4080-152-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/4080-157-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/4080-172-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/4608-138-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/4608-146-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/4608-136-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/4708-150-0x0000000002291000-0x0000000002294000-memory.dmp

            Filesize

            12KB

          • memory/4720-166-0x0000000002091000-0x0000000002093000-memory.dmp

            Filesize

            8KB