Analysis

  • max time kernel
    106s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 11:22

General

  • Target

    e30ba4d07957896ae39a7c30946c0f56648be50b36654baa753a722aa449e5a8.exe

  • Size

    581KB

  • MD5

    6d772f1a3dfc1991d911283ee967cb31

  • SHA1

    8fe1e316bde7ec7c4420f97d114f45ba5266d84a

  • SHA256

    e30ba4d07957896ae39a7c30946c0f56648be50b36654baa753a722aa449e5a8

  • SHA512

    dad6e476a8f1b4371521999e5c1286231882ef9cc0a2a099e51afa39647ab06f7791fb7b3971b53e023b6963f772e354a39a2baa6872c3a90a97a2a306085097

  • SSDEEP

    12288:uoMDtCi7NFlZnNqZ9xGrLpZ0ZHEqtgb0UI:ufplNFgxG5eZngb0b

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e30ba4d07957896ae39a7c30946c0f56648be50b36654baa753a722aa449e5a8.exe
    "C:\Users\Admin\AppData\Local\Temp\e30ba4d07957896ae39a7c30946c0f56648be50b36654baa753a722aa449e5a8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
      C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.97199.com/install2/?sl3
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:900
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:900 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:760
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
        3⤵
          PID:1100
      • C:\Users\Admin\AppData\Local\Temp\nbfile1.exe
        C:\Users\Admin\AppData\Local\Temp\nbfile1.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1292
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\newsetup.vbs"
          3⤵
            PID:1924
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\1.vbs"
            3⤵
              PID:1972

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\nbfile0.exe

                Filesize

                467KB

                MD5

                74869a0346ab36bbba85022612505121

                SHA1

                2cd02f46f2f9f46eaf15fce40a3bf4781f80cf8a

                SHA256

                6de866b5c8abb1db9b2be231b365c1aa029118fbc58823f443f00e3a33dff18a

                SHA512

                723812083113cff82aa5e2243759c572518865e351cc81b7c2b85a05557862dbbd7a98b964ff6f3aa3802bb5d4dab01a14147211495fc5803d9ddb7b715f4de5

              • C:\Users\Admin\AppData\Local\Temp\nbfile1.exe

                Filesize

                52KB

                MD5

                c4ddf11ebdbf9d8397d710d2cb4e2fab

                SHA1

                8008c97e7d6ff92deb3e1755a614f4afedca92b9

                SHA256

                67a632049e45c25de35b533659624ca24f8e70447abca015bf5776ce6cb3ded6

                SHA512

                3c9be7b92208e8c0f57ab8048108714e06b2aa896a479f61637a93a9eacb4818fcb25ce3d4e1a24086558daeae65d4b482b2c1cfba3df202c396e2bc218362e9

              • C:\Users\Admin\AppData\Local\Temp\nbfile1.exe

                Filesize

                52KB

                MD5

                c4ddf11ebdbf9d8397d710d2cb4e2fab

                SHA1

                8008c97e7d6ff92deb3e1755a614f4afedca92b9

                SHA256

                67a632049e45c25de35b533659624ca24f8e70447abca015bf5776ce6cb3ded6

                SHA512

                3c9be7b92208e8c0f57ab8048108714e06b2aa896a479f61637a93a9eacb4818fcb25ce3d4e1a24086558daeae65d4b482b2c1cfba3df202c396e2bc218362e9

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\COMJ798X.txt

                Filesize

                606B

                MD5

                9a20960e3279effb44d324b9c12965e1

                SHA1

                e8a0b848c21d171ca9f0ecdbbc57ec496fdb0470

                SHA256

                caefc22c888b8ba6e501c2a43ed23550fcfafcec6f2d00bbb7a694e123de37b1

                SHA512

                5ef5f2405f532a5ecd44304db875dd1fb778cc98b641561876be60d149a5392a58eecf12f23912e6bc4de4f267934223ec7c1b7a7f52a69a40ebdeef22bfa863

              • C:\newsetup.vbs

                Filesize

                651B

                MD5

                4736e7158c27f244482f5a614b9dbdae

                SHA1

                d3a0e95a81e9e3ec95cfd596b25749a0e24e27b9

                SHA256

                b8229bc8d6b0013858fb9599cb510afa4566a439164b2c7444c449540a124acc

                SHA512

                cebf895dd3ec3822c42b78bac49c685b063cb5afcbcfb3850b073cb118d086c5fa75ec50b6e73d90e14f2c6b595752ad87910b8cf27378424d72a9ea309bf824

              • \Users\Admin\AppData\Local\Temp\nbfile0.exe

                Filesize

                467KB

                MD5

                74869a0346ab36bbba85022612505121

                SHA1

                2cd02f46f2f9f46eaf15fce40a3bf4781f80cf8a

                SHA256

                6de866b5c8abb1db9b2be231b365c1aa029118fbc58823f443f00e3a33dff18a

                SHA512

                723812083113cff82aa5e2243759c572518865e351cc81b7c2b85a05557862dbbd7a98b964ff6f3aa3802bb5d4dab01a14147211495fc5803d9ddb7b715f4de5

              • \Users\Admin\AppData\Local\Temp\nbfile0.exe

                Filesize

                467KB

                MD5

                74869a0346ab36bbba85022612505121

                SHA1

                2cd02f46f2f9f46eaf15fce40a3bf4781f80cf8a

                SHA256

                6de866b5c8abb1db9b2be231b365c1aa029118fbc58823f443f00e3a33dff18a

                SHA512

                723812083113cff82aa5e2243759c572518865e351cc81b7c2b85a05557862dbbd7a98b964ff6f3aa3802bb5d4dab01a14147211495fc5803d9ddb7b715f4de5

              • \Users\Admin\AppData\Local\Temp\nbfile1.exe

                Filesize

                52KB

                MD5

                c4ddf11ebdbf9d8397d710d2cb4e2fab

                SHA1

                8008c97e7d6ff92deb3e1755a614f4afedca92b9

                SHA256

                67a632049e45c25de35b533659624ca24f8e70447abca015bf5776ce6cb3ded6

                SHA512

                3c9be7b92208e8c0f57ab8048108714e06b2aa896a479f61637a93a9eacb4818fcb25ce3d4e1a24086558daeae65d4b482b2c1cfba3df202c396e2bc218362e9

              • \Users\Admin\AppData\Local\Temp\nbfile1.exe

                Filesize

                52KB

                MD5

                c4ddf11ebdbf9d8397d710d2cb4e2fab

                SHA1

                8008c97e7d6ff92deb3e1755a614f4afedca92b9

                SHA256

                67a632049e45c25de35b533659624ca24f8e70447abca015bf5776ce6cb3ded6

                SHA512

                3c9be7b92208e8c0f57ab8048108714e06b2aa896a479f61637a93a9eacb4818fcb25ce3d4e1a24086558daeae65d4b482b2c1cfba3df202c396e2bc218362e9

              • \Users\Admin\AppData\Local\Temp\nbfile1.exe

                Filesize

                52KB

                MD5

                c4ddf11ebdbf9d8397d710d2cb4e2fab

                SHA1

                8008c97e7d6ff92deb3e1755a614f4afedca92b9

                SHA256

                67a632049e45c25de35b533659624ca24f8e70447abca015bf5776ce6cb3ded6

                SHA512

                3c9be7b92208e8c0f57ab8048108714e06b2aa896a479f61637a93a9eacb4818fcb25ce3d4e1a24086558daeae65d4b482b2c1cfba3df202c396e2bc218362e9

              • \Users\Admin\AppData\Local\Temp\nbfile1.exe

                Filesize

                52KB

                MD5

                c4ddf11ebdbf9d8397d710d2cb4e2fab

                SHA1

                8008c97e7d6ff92deb3e1755a614f4afedca92b9

                SHA256

                67a632049e45c25de35b533659624ca24f8e70447abca015bf5776ce6cb3ded6

                SHA512

                3c9be7b92208e8c0f57ab8048108714e06b2aa896a479f61637a93a9eacb4818fcb25ce3d4e1a24086558daeae65d4b482b2c1cfba3df202c396e2bc218362e9

              • \Users\Admin\AppData\Local\Temp\nbfile1.exe

                Filesize

                52KB

                MD5

                c4ddf11ebdbf9d8397d710d2cb4e2fab

                SHA1

                8008c97e7d6ff92deb3e1755a614f4afedca92b9

                SHA256

                67a632049e45c25de35b533659624ca24f8e70447abca015bf5776ce6cb3ded6

                SHA512

                3c9be7b92208e8c0f57ab8048108714e06b2aa896a479f61637a93a9eacb4818fcb25ce3d4e1a24086558daeae65d4b482b2c1cfba3df202c396e2bc218362e9

              • memory/784-60-0x0000000000220000-0x00000000002AA000-memory.dmp

                Filesize

                552KB

              • memory/784-59-0x0000000000220000-0x00000000002AA000-memory.dmp

                Filesize

                552KB

              • memory/1292-69-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

                Filesize

                8KB

              • memory/2032-64-0x0000000000400000-0x000000000048A000-memory.dmp

                Filesize

                552KB

              • memory/2032-61-0x0000000000400000-0x000000000048A000-memory.dmp

                Filesize

                552KB