Analysis

  • max time kernel
    136s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 09:21

General

  • Target

    f112c25e52d181caf82da87756b364bd8182064e9dd20beb61d6281fa6ec7ced.exe

  • Size

    147KB

  • MD5

    62c4ed93e22dc224c7422c9c826f90f0

  • SHA1

    550dff614a9d85ecede94e99d930efb113d30558

  • SHA256

    f112c25e52d181caf82da87756b364bd8182064e9dd20beb61d6281fa6ec7ced

  • SHA512

    5c4bfb6762b891dcab6edd22da69791dabeca72dce9f04020bb2ed50dd153f680071aa9c851235de2c223a4f41e50d846148ee3cc4cbe9f41b580db71fafec3b

  • SSDEEP

    3072:b1dlKwgj23+Oz05YoNozJ+ghRlPK87qfq3NTKXa7:b1dlZro5yg6XVNYa7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f112c25e52d181caf82da87756b364bd8182064e9dd20beb61d6281fa6ec7ced.exe
    "C:\Users\Admin\AppData\Local\Temp\f112c25e52d181caf82da87756b364bd8182064e9dd20beb61d6281fa6ec7ced.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3856
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Extracted\1619_mn66com.gif
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4896 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2316

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Extracted\1619_mn66com.gif

          Filesize

          32KB

          MD5

          3618a3c46dac15b1608dbc88a140cc62

          SHA1

          a859c9687c1ddcd8b96ef7542d2399a6755e8ed5

          SHA256

          313ddb74f0bc1b5b6700d86c7334c80bacd7d9732e50912df5d8b6b94973d3e3

          SHA512

          f6c9cf748e7eacc3b860d4360e624efaa95126fdaf317add39f3262cc70a81cc3d2cc9b3fffd617f2dc3e81fbe7bc6a6531fd9d0139daa3a9383e8e9d6caaf1f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          7de3527d962389a61a0825bebf9031b7

          SHA1

          ffc04b363ec1d3976e454446827d36813002a9b7

          SHA256

          63db191be3bdce3f969a6f457edaa2bf5c9ec863a311540d719ad80ca9ce4a19

          SHA512

          57220b86487cefb01b4c2b9b904a147ea35133f490d5da092dbf10e1568c14a2f1359ed36529edc779335a9f4530c25a67d2065620379eec0e682b03389ae91d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          2eb8ef189f5ceab5f11d56d03f038af9

          SHA1

          4cb025e60f976e0750f9cad22345bd8495dc988d

          SHA256

          c236639c0a163665990ade8a748bbcddfc777a61a38462c598d13c590a8a4742

          SHA512

          0c69d5f79f336bd9cfa72b7b4fc4555ad1e0494bb6d6c7c5dd1eda52bb22b83e6bcc608530e3f244f6213aa3315997bee0bcf16e3b5359961fe3fb78ec9aab31