Analysis

  • max time kernel
    165s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2022 14:10

General

  • Target

    4b02e36b0dc4c3a45cb22e12e5068894733bcc16165a57ff470cf4436e8e2ff4.exe

  • Size

    65KB

  • MD5

    6826454ce86d7227720436768129ae70

  • SHA1

    55147b8634806ed09b6073e244b669b6737178e1

  • SHA256

    4b02e36b0dc4c3a45cb22e12e5068894733bcc16165a57ff470cf4436e8e2ff4

  • SHA512

    65502c0bddf7d7209d0bdaeabec8304010cb65608a6aa6f780b9075f62575a8f5f1adedabaf02608bdd3166654e660e010748affd6ec657f98060f1afc464312

  • SSDEEP

    768:4a4r+PpHfXGLOFCk6SLARI+WEkFfsEjUPIOuJI5R7xuMAnXMcMaJIWmS2zIzV9xE:sr+Fum5LMI+WTJjcsnXMcpm/zOxJXKJf

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops desktop.ini file(s) 24 IoCs
  • Drops autorun.inf file 1 TTPs 25 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b02e36b0dc4c3a45cb22e12e5068894733bcc16165a57ff470cf4436e8e2ff4.exe
    "C:\Users\Admin\AppData\Local\Temp\4b02e36b0dc4c3a45cb22e12e5068894733bcc16165a57ff470cf4436e8e2ff4.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\AE 0124 BE.gif
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:852
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:852 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1376
    • C:\Windows\SysWOW64\drivers\winlogon.exe
      "C:\Windows\System32\drivers\winlogon.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops autorun.inf file
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Windows\AE 0124 BE.exe
        "C:\Windows\AE 0124 BE.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops desktop.ini file(s)
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Windows\SysWOW64\drivers\winlogon.exe
          "C:\Windows\System32\drivers\winlogon.exe"
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1832
      • C:\Windows\SysWOW64\drivers\winlogon.exe
        "C:\Windows\System32\drivers\winlogon.exe"
        3⤵
        • Executes dropped EXE
        PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7WLCWOTR.txt

    Filesize

    608B

    MD5

    583874efffacf7577cc12f70b715abea

    SHA1

    b34ea386c14c388e05bd6d00156198788f55a6f6

    SHA256

    065c0544a791d3a9dc9d80edceee9cee3b0eb001bd4c70dbc19c6c92dcbd5333

    SHA512

    de96f1b64af3d3756c660e18cecccd5a52906c1a2d7ae144698a15547869081e34ddfb2d726f13ffb7012d1dc583dcac4792d4972c2fdf894d6737db52a0ffab

  • C:\Windows\AE 0124 BE.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • C:\Windows\AE 0124 BE.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • C:\Windows\AE 0124 BE.gif

    Filesize

    65KB

    MD5

    39655c13f85ea8155379695807c99b42

    SHA1

    c71a1919b310133c547cab0bf55e818ab5883051

    SHA256

    6cb7d41e115762824337dfeeecf554747181c24c41155ed549654ff89155c64e

    SHA512

    380e324ffc6bd86a23ecca1c729654a90abff9fc2c66a0d8bfc1ea05a17b90aac8964488abe25f0de950056c79e6bbafbe6473ee2810ef3cbf69876c37b2267d

  • C:\Windows\AE 0124 BE.gif

    Filesize

    130KB

    MD5

    0c9637ad9ff99d90815aa715c9401b11

    SHA1

    963408d2d09a0f1212bfeacc9be2c93b0e421590

    SHA256

    609486740d57fbc402c1fb324d2cd7a7d5dc2d6f7470adc0a5a4f5f3bbc3de59

    SHA512

    203b9cebfb9336095d5bfd512c0010dd88c83e5a467dc682ccb498ca02e4991acdbb511c3611960848b99e61a7021aae7495433515f684ead2dd5bc15a962ca4

  • C:\Windows\Msvbvm60.dll

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\drivers\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • C:\Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • C:\Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • C:\Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • \??\c:\B1uv3nth3x1.diz

    Filesize

    21B

    MD5

    9cceaa243c5d161e1ce41c7dad1903dd

    SHA1

    e3da72675df53fffa781d4377d1d62116eafb35b

    SHA256

    814649b436ea43dd2abb99693e06019d4079ee74d02a0395913add0ba92d0189

    SHA512

    af9b75dc9a0b39d12d48bf6d40eb7d778eb9dd976302792271d8d4245a916027cf4e705d6cd7a5e6582ba94953346f291122f27d377b2c1a86e45f49e92efb5b

  • \??\c:\B1uv3nth3x1.diz

    Filesize

    21B

    MD5

    9cceaa243c5d161e1ce41c7dad1903dd

    SHA1

    e3da72675df53fffa781d4377d1d62116eafb35b

    SHA256

    814649b436ea43dd2abb99693e06019d4079ee74d02a0395913add0ba92d0189

    SHA512

    af9b75dc9a0b39d12d48bf6d40eb7d778eb9dd976302792271d8d4245a916027cf4e705d6cd7a5e6582ba94953346f291122f27d377b2c1a86e45f49e92efb5b

  • \Windows\SysWOW64\drivers\Msvbvm60.dll

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • \Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • \Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • \Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • \Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • \Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • \Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    130KB

    MD5

    d137023fb0ebaf4ce85aa38df368165f

    SHA1

    fc1aa49a789e72fc9f458388a360eb6bf55d3f9a

    SHA256

    492213722834b7979edbefaa5317f71a6b6ac5fbb41d9ff5118a86fdedc7e590

    SHA512

    0bd07e6a104c89bc9f9db6b7da4392bc01259bf9a7c8c35bb9fbb18ef5510e46ac012f210304e604fd3b3a17124b395499edeecd4d481cf43303a6a35c2118d4

  • memory/1208-60-0x0000000000000000-mapping.dmp

  • memory/1404-66-0x0000000000000000-mapping.dmp

  • memory/1664-75-0x0000000000000000-mapping.dmp

  • memory/1832-80-0x0000000000000000-mapping.dmp

  • memory/1948-56-0x0000000076871000-0x0000000076873000-memory.dmp

    Filesize

    8KB