Analysis

  • max time kernel
    110s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 08:28

General

  • Target

    ecf9ce345d03547056b276e7b45af498210ca29a5895e2a19af4710ad072d3ac.exe

  • Size

    289KB

  • MD5

    5725a7142c9aae016bf49d3a827a5d97

  • SHA1

    16b86d45da91715d65035ad968fec0b9074c3e7e

  • SHA256

    ecf9ce345d03547056b276e7b45af498210ca29a5895e2a19af4710ad072d3ac

  • SHA512

    55abe0ee5fab60c98f26c5ffa9b81e11c9c52e5cc35358d470fbb0fc852c5c696ed8103e9a3f1d913791a82f527ed0332a6a072775b8ca48b54f0052c3feb1e5

  • SSDEEP

    6144:t/0uo5P7yKRUWNjNhCHM1S9K/LdC+aAP7Y4:tJCfUa4H2Sy9zF

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecf9ce345d03547056b276e7b45af498210ca29a5895e2a19af4710ad072d3ac.exe
    "C:\Users\Admin\AppData\Local\Temp\ecf9ce345d03547056b276e7b45af498210ca29a5895e2a19af4710ad072d3ac.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\white.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\white.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=white.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:564

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\white.exe
    Filesize

    344KB

    MD5

    b03b6280347d6f51a16cbf0930fee1bc

    SHA1

    ae90d123447132223332890f79f7c7dc60020716

    SHA256

    4c46b20b0a3d0fa22fa058e6becc05ec2b3179a1e90e8f674fb1b0195397b18d

    SHA512

    3086aca14963b45728403d9412f73f3e59e51eb56038e427519d70cec7d7881e822352802844dffccb6500b32e0e49abf86a0718e7811b40b17c02cf11ac4cc0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\white.exe
    Filesize

    344KB

    MD5

    b03b6280347d6f51a16cbf0930fee1bc

    SHA1

    ae90d123447132223332890f79f7c7dc60020716

    SHA256

    4c46b20b0a3d0fa22fa058e6becc05ec2b3179a1e90e8f674fb1b0195397b18d

    SHA512

    3086aca14963b45728403d9412f73f3e59e51eb56038e427519d70cec7d7881e822352802844dffccb6500b32e0e49abf86a0718e7811b40b17c02cf11ac4cc0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JDA72F6X.txt
    Filesize

    593B

    MD5

    e888f88c046086250a8719651e3e5c65

    SHA1

    3a38c0bff833306d2d9028c4686707aff4bb3c56

    SHA256

    2acab8f5c64ce64cff690efd58e6650cac434ec5294036d11163a084deb1f796

    SHA512

    3cd3b67485dd8356887d4c2c71d73cdd3569b1bbff834ccb5914b450e765fe406a20a5d5328e2efaa49d939672ce4a9ec78db53cae81e214d7c9021d93ab502a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\white.exe
    Filesize

    344KB

    MD5

    b03b6280347d6f51a16cbf0930fee1bc

    SHA1

    ae90d123447132223332890f79f7c7dc60020716

    SHA256

    4c46b20b0a3d0fa22fa058e6becc05ec2b3179a1e90e8f674fb1b0195397b18d

    SHA512

    3086aca14963b45728403d9412f73f3e59e51eb56038e427519d70cec7d7881e822352802844dffccb6500b32e0e49abf86a0718e7811b40b17c02cf11ac4cc0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\white.exe
    Filesize

    344KB

    MD5

    b03b6280347d6f51a16cbf0930fee1bc

    SHA1

    ae90d123447132223332890f79f7c7dc60020716

    SHA256

    4c46b20b0a3d0fa22fa058e6becc05ec2b3179a1e90e8f674fb1b0195397b18d

    SHA512

    3086aca14963b45728403d9412f73f3e59e51eb56038e427519d70cec7d7881e822352802844dffccb6500b32e0e49abf86a0718e7811b40b17c02cf11ac4cc0

  • memory/1132-54-0x0000000075561000-0x0000000075563000-memory.dmp
    Filesize

    8KB

  • memory/1548-61-0x0000000000400000-0x0000000000478000-memory.dmp
    Filesize

    480KB

  • memory/1548-62-0x0000000000810000-0x000000000084D000-memory.dmp
    Filesize

    244KB

  • memory/1548-63-0x0000000002261000-0x0000000002265000-memory.dmp
    Filesize

    16KB

  • memory/1548-64-0x0000000002270000-0x0000000002370000-memory.dmp
    Filesize

    1024KB

  • memory/1548-65-0x00000000003D1000-0x00000000003D5000-memory.dmp
    Filesize

    16KB

  • memory/1548-66-0x0000000002370000-0x0000000002470000-memory.dmp
    Filesize

    1024KB

  • memory/1548-67-0x0000000000400000-0x0000000000478000-memory.dmp
    Filesize

    480KB

  • memory/1548-68-0x0000000000810000-0x000000000084D000-memory.dmp
    Filesize

    244KB

  • memory/1548-56-0x0000000000000000-mapping.dmp