Analysis

  • max time kernel
    119s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 02:59

General

  • Target

    adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe

  • Size

    76KB

  • MD5

    7ba912af2aef3afb969f67f5afc9a6d0

  • SHA1

    522af879ba9b007f48d69ef6888739022addab84

  • SHA256

    adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb

  • SHA512

    b3f1f6d0576bbbe4da78e13c99d452ef6cbb4b9912123e11cf430678bc35f3a61d2b7471f30b44f1c6e36f3cfb553fd90bca958e6d570dd89a877dcbff30a706

  • SSDEEP

    768:jxDI8Nwl34ETcpcbCgHjSJ070vvLXmJuBGNgj5mMjI1t0cT4qf7hOZR6f6Y:jxDXwTQcbCg29nLXcu8h7hOZRhY

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe
    "C:\Users\Admin\AppData\Local\Temp\adaec2245a4b01d2ff9f68260ed9a3ce9ce6754b22a0032d3812e00472a925bb.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://hotvid44.com/bind2.php?id=3913367
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1432 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:576
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Windows\system32\hdbt.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AMR1CF9B.txt

    Filesize

    606B

    MD5

    abcee64c4c71877eda8aea66b0f6e602

    SHA1

    c9f783309aa09f14693986922d4e31c5dad00402

    SHA256

    6e84f134b78912f913ffc02cb1fd7e343fe4024bcab461339790d7c9959027e7

    SHA512

    8ab0f9babbd34c48bead76a71a41d8507f524cea6d380f914301fe52da9d7ec2d48a8ad7a63270a841ed4d3aa8bf878f46a5f3a437b2f64df6796740e11ab1ad

  • C:\Windows\SysWOW64\hdbt.dll

    Filesize

    52KB

    MD5

    f6a2a59a84cd7d3bb109ad6acdd7ba39

    SHA1

    c0dc3e9ee183fbe659830d8b65791f6dd993e668

    SHA256

    a221c8b0bdbce003df66f7bed5236b304980f70a297ee85c56f94ed1dac67c9d

    SHA512

    f1d2239da5562e1f8a9fb089077288d1c0bed0908bd669a5638e97a6c874bcdd0bfc48b1be2a77837f984465f4a50bb17ca34291f1e0f97ac49f14451ebf3d7b

  • \Windows\SysWOW64\hdbt.dll

    Filesize

    52KB

    MD5

    f6a2a59a84cd7d3bb109ad6acdd7ba39

    SHA1

    c0dc3e9ee183fbe659830d8b65791f6dd993e668

    SHA256

    a221c8b0bdbce003df66f7bed5236b304980f70a297ee85c56f94ed1dac67c9d

    SHA512

    f1d2239da5562e1f8a9fb089077288d1c0bed0908bd669a5638e97a6c874bcdd0bfc48b1be2a77837f984465f4a50bb17ca34291f1e0f97ac49f14451ebf3d7b

  • memory/2044-54-0x0000000075F81000-0x0000000075F83000-memory.dmp

    Filesize

    8KB