Analysis

  • max time kernel
    188s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2022 17:40

General

  • Target

    b15cede3e97bccfe50fc2e104c73109b895e9266364336da432f010ee2a0ea7a.exe

  • Size

    212KB

  • MD5

    5fc3df3d1f66a8a70a4f65fcd02ad813

  • SHA1

    1c123cc47ed48723a168c89709de96d56103227f

  • SHA256

    b15cede3e97bccfe50fc2e104c73109b895e9266364336da432f010ee2a0ea7a

  • SHA512

    53967e2b9251bf7b0e85276d001dd34d5c91ac601e9d83e2ef64024d601d6dd465a5c8eba416ef246852f7b51c8e075e8ef72b836835f9b4215af5e080f4dcf9

  • SSDEEP

    6144:fzanGw+tnswng5nLnQ/n0ogdn3muA36IlLpjie5teizueDmL:ffNJ8TA36ING

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b15cede3e97bccfe50fc2e104c73109b895e9266364336da432f010ee2a0ea7a.exe
    "C:\Users\Admin\AppData\Local\Temp\b15cede3e97bccfe50fc2e104c73109b895e9266364336da432f010ee2a0ea7a.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3472
    • \??\c:\Program FilesXYEL90.exe
      "c:\Program FilesXYEL90.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1132
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2264
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2536
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
        PID:2460

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program FilesXYEL90.exe

      Filesize

      36KB

      MD5

      cd4fc5be68fd8c65b3b25ae1f2d27144

      SHA1

      57f5187864cbdd2527252ce7b9a8dc043a66cff1

      SHA256

      5ec06b2d8068fe1400247bc88680e3436bce6dc22bfe139a23df9774c37a1489

      SHA512

      f16ab77564229b6a127bb00dda51629e0f42b2c20ae85b75455475593e2888664bf68e120c39979f3bc7b9ecaf3fc4432029b3afc91adc785341888466a8f358

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      957d711ef13aae49d723c4d2b1d4fa37

      SHA1

      aa818a5cfb5ce97987c05c8f20866cbbafb4bf93

      SHA256

      43184ac9a857febd19b97a04797528a7de0c15744ae3d540e23cc4b5f1d2641b

      SHA512

      f5c8fb180bba40d0755c909349bb960be5b8242de651237b9c2368d74accbf845f3cad131ff9b80f71745353dd11b53ddda7fd5cb928a2f543be217b9e975030

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      3c2098dca6315a5c0e379c31c25a9ef8

      SHA1

      ea7ca6052f7ea8cece1316aba8ba2a94ded4b3a8

      SHA256

      d8782384068f39a45a61ea5ad773a8d4f396f706682912214c425c5cc73b1557

      SHA512

      2c5bfc7d530ab2efe5d1fbee840db6c0d5560af5de8bf811720fd339ee1f692023d3463ce1e30c7fe4679f3b26002d9f9c2e08ea548b39dc93cebcfc115a9ec3

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8DA35E48-4A79-11ED-89AC-E23A5D90AA50}.dat

      Filesize

      5KB

      MD5

      a4a3c141411f495f620f2c98ba2de700

      SHA1

      6ceda0dd902f4dc0f75637b08e3f740ef1ed64aa

      SHA256

      cd1646b66ad1e1a7825a2740dc9a5588592313aab7944ea7c44a6f39b371f09a

      SHA512

      96d066c318178e955931f7896e0ff0d6d79b84a6df54198a556b57366a2efe6ab78ef2af1edf04dfb8641aabb4117605744266e0aa2a280149486dc0bfc9cde4

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8DA38558-4A79-11ED-89AC-E23A5D90AA50}.dat

      Filesize

      5KB

      MD5

      b2e66802a39fcf3019fc0ab9b2626be9

      SHA1

      47fe012d5c36173271b0dfa6c27eca00a77759c0

      SHA256

      a4e4d1db27d3f06c5cd8f4c772b05c08646e5c7fd00ef7918f77d481aeae79b7

      SHA512

      b81ec620959f27a2ccafa1e596f884ec3d32715ac1ff44e8a5eb10ce328589b839646715787dafaee6f6ea2145437b72bceadf2b685f1897486f6195171cf795

    • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

      Filesize

      486B

      MD5

      1950abe356fd551871006e4ee85ab24d

      SHA1

      b2a3ab844d0008c5ad801ed3f4dacd0cb34f1103

      SHA256

      d875ffdff234147bbf6f4e6eb7c07e4c6ebb1a2437ca75207cdf931995b91f8b

      SHA512

      0e285a8c01140600db00b61bb5db7753c47f9d2a5dcebdacfdd38d36ecab4f361b4d8bd523796450cf324e4be1b60e05f02010f1d3d60b7806bd817dfe8d0057

    • \??\c:\Program FilesXYEL90.exe

      Filesize

      36KB

      MD5

      cd4fc5be68fd8c65b3b25ae1f2d27144

      SHA1

      57f5187864cbdd2527252ce7b9a8dc043a66cff1

      SHA256

      5ec06b2d8068fe1400247bc88680e3436bce6dc22bfe139a23df9774c37a1489

      SHA512

      f16ab77564229b6a127bb00dda51629e0f42b2c20ae85b75455475593e2888664bf68e120c39979f3bc7b9ecaf3fc4432029b3afc91adc785341888466a8f358

    • memory/1188-134-0x0000000000000000-mapping.dmp

    • memory/2460-139-0x0000000000000000-mapping.dmp