Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2022 20:53

General

  • Target

    ec217b66ab621ff11e2d026c9e97b6ccfd8b68df576fb40f163e4ba76835e8f0.exe

  • Size

    132KB

  • MD5

    fa83a72c7ac9e01d1e6bf358052a03a6

  • SHA1

    ac2feba34b0887d9ef7c869072dee14b2e9a469e

  • SHA256

    ec217b66ab621ff11e2d026c9e97b6ccfd8b68df576fb40f163e4ba76835e8f0

  • SHA512

    34d88abd6b293da68b3945f1abf248c282113691679a0c6c2715898606660562fbb79a088b666902b456282c081bd4e1e1e55940c436c9928cde68e3c6e2f46e

  • SSDEEP

    3072:F+YRMKu7er+OOdZK3YUVL1I37IKMv3/k0r9LNDxf7hxSA:Qf7uRVLmDP0rTD

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    up.tyoo.cc
  • Port:
    21
  • Username:
    anonymous
  • Password:
    IEUser@

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec217b66ab621ff11e2d026c9e97b6ccfd8b68df576fb40f163e4ba76835e8f0.exe
    "C:\Users\Admin\AppData\Local\Temp\ec217b66ab621ff11e2d026c9e97b6ccfd8b68df576fb40f163e4ba76835e8f0.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:5024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads