Analysis

  • max time kernel
    130s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2022 12:39

General

  • Target

    6db62dd8dd030ef514337fb3c7f147c0665efbcc37b1ff97707ed74094a8835d.exe

  • Size

    1.3MB

  • MD5

    9452b43c872f4faee376be781cc806ac

  • SHA1

    9c4cd526673d65da48b338254a7026a705e54bee

  • SHA256

    6db62dd8dd030ef514337fb3c7f147c0665efbcc37b1ff97707ed74094a8835d

  • SHA512

    4a4ef2cc77a4915c76f002050b0c54ca5494d0e972e95c912cc7a59c47a5861069a1b933ba862fc315bd1e185fea66dee04475157d7b16e421d156889c7d751e

  • SSDEEP

    24576:Z2cJ+//0wDXIxwbDbNyGYb8hDymv6+zQ6ZbpzN0OUQmCRkRuRD:Z2cJqPLV/F9v65UaOUQmCuRuR

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6db62dd8dd030ef514337fb3c7f147c0665efbcc37b1ff97707ed74094a8835d.exe
    "C:\Users\Admin\AppData\Local\Temp\6db62dd8dd030ef514337fb3c7f147c0665efbcc37b1ff97707ed74094a8835d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\6db62dd8dd030ef514337fb3c7f147c0665efbcc37b1ff97707ed74094a8835d.exe
      PECMD**pecmd-cmd* PUTF "C:\Users\Admin\AppData\Local\Temp\~~4651351452857323937.tmp.exe",,"C:\Users\Admin\AppData\Local\Temp\6db62dd8dd030ef514337fb3c7f147c0665efbcc37b1ff97707ed74094a8835d.exe""#102|SCRIPT"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:608
    • C:\Users\Admin\AppData\Local\Temp\~~4651351452857323937.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\~~4651351452857323937.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.lx7d.com/forum.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:748
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:748 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:564
    • C:\Users\Admin\AppData\Local\Temp\6db62dd8dd030ef514337fb3c7f147c0665efbcc37b1ff97707ed74094a8835d.exe
      PECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~8046474813312264262.cmd"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\system32\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\~8046474813312264262.cmd"
        3⤵
          PID:900

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

      Filesize

      5KB

      MD5

      b313d210eff71dc2221e7f55dcc63a89

      SHA1

      553db0ca500ec440b1ba1c6c83d28c411a76a7fc

      SHA256

      a6257c5046b839ee73c05a8e9f12ab69fd8d40b28fd87dc17b3f414791ed0912

      SHA512

      868ea0597995ca79fb975676f4c07e94d9fd8523d1531dc78afbb14c2f96b49c897f18a5279bcab0bc8b9f339f3401d3273eaa497a36a38e65967e87aa9e7e40

    • C:\Users\Admin\AppData\Local\Temp\~8046474813312264262.cmd

      Filesize

      404B

      MD5

      23579ac1e4c43fcb2c04f6d1f8a794fd

      SHA1

      5be44aa7755e4d958c495c041f8dd00cf83a4f30

      SHA256

      d2249035ccee86f89043af846bd969d02226e0de569ecdebf81d0da55b944118

      SHA512

      da272e81cb905bc709b6098082e7290f7ef2e50affd6fbdfc66c21030d3865327914923f8ec5381715cfde85b7532e67186b2d71e34174dd2dd1b13cc56c0e63

    • C:\Users\Admin\AppData\Local\Temp\~~4651351452857323937.tmp.exe

      Filesize

      780KB

      MD5

      626903ee8e09561cf1874db9aea14a2a

      SHA1

      bb712ab8f0e3439f6cc8a0ac69529c2317a20bba

      SHA256

      ac0afc4ab33420118d4f4f0f4141c81cf4fab1f39bb0b2b2b9fc831fd7fd07e1

      SHA512

      e9cfd3b1656db3acf90f00777bd105264fcc0f9a4edbb7b630d509255d4a52111e0b79c18e64c2fa72aad8e77aeaa2d173ac407aed968b2c1f202977ed14fc78

    • C:\Users\Admin\AppData\Local\Temp\~~4651351452857323937.tmp.exe

      Filesize

      780KB

      MD5

      626903ee8e09561cf1874db9aea14a2a

      SHA1

      bb712ab8f0e3439f6cc8a0ac69529c2317a20bba

      SHA256

      ac0afc4ab33420118d4f4f0f4141c81cf4fab1f39bb0b2b2b9fc831fd7fd07e1

      SHA512

      e9cfd3b1656db3acf90f00777bd105264fcc0f9a4edbb7b630d509255d4a52111e0b79c18e64c2fa72aad8e77aeaa2d173ac407aed968b2c1f202977ed14fc78

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5GK1Z530.txt

      Filesize

      606B

      MD5

      38385b6eb4fc6c9154fae6523293a959

      SHA1

      04c5c70c31605b00716048518b0c395cb26c052d

      SHA256

      8a610e9a9dfb130eac8b10720d7372841be38b09ce5598e344ba94698419cf4d

      SHA512

      474173199466105a739e8ff60e761dc40868be99e2fbcde6643fa2b18ae0b89dd896648b030a80b448752dc9a63d2058022d7f0486ac80c4ab16dd5de2737fea

    • memory/608-55-0x0000000140000000-0x00000001401F6000-memory.dmp

      Filesize

      2.0MB

    • memory/904-61-0x00000000750A1000-0x00000000750A3000-memory.dmp

      Filesize

      8KB

    • memory/1348-59-0x0000000140000000-0x00000001401F6000-memory.dmp

      Filesize

      2.0MB

    • memory/1348-60-0x0000000002060000-0x0000000002256000-memory.dmp

      Filesize

      2.0MB

    • memory/1348-62-0x000007FEFB8B1000-0x000007FEFB8B3000-memory.dmp

      Filesize

      8KB

    • memory/1348-67-0x0000000140000000-0x00000001401F6000-memory.dmp

      Filesize

      2.0MB

    • memory/1768-65-0x0000000140000000-0x00000001401F6000-memory.dmp

      Filesize

      2.0MB