Analysis

  • max time kernel
    97s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2022, 17:54

General

  • Target

    ad0b2c51441e6ff907d25a1ba2b79c13feb0d1f1000f5f45595e7948adc4c089.exe

  • Size

    800KB

  • MD5

    7a1e45c15e4925ded0896595ff9db630

  • SHA1

    0b21a0b24d9ffc3c546c5ec4aeaa8c47d88e563a

  • SHA256

    ad0b2c51441e6ff907d25a1ba2b79c13feb0d1f1000f5f45595e7948adc4c089

  • SHA512

    4c19435a80484b1942d0c3e7c191b8aba12b33e09ae5579cf14cbdf16da0474ebebc10e409e6f94dfa2edc8a62e6116c88cfe6bb19291e854f09b93471559a0c

  • SSDEEP

    12288:iNjhe5148vKzNzUUgUILrVMg2bIL3fG4y4YVNZ6i+wz:ytMCpD6DVuNoi+w

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies data under HKEY_USERS 29 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad0b2c51441e6ff907d25a1ba2b79c13feb0d1f1000f5f45595e7948adc4c089.exe
    "C:\Users\Admin\AppData\Local\Temp\ad0b2c51441e6ff907d25a1ba2b79c13feb0d1f1000f5f45595e7948adc4c089.exe"
    1⤵
    • Drops startup file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.xiai.cc/#tan
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:820 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:812
  • C:\Windows\SysWOW64\WinNtServer.exe
    C:\Windows\SysWOW64\WinNtServer.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel /v "{"871C5380-42A0-1069-A2EA-08002B30309D"}" /t REG_DWORD /d 1 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel /v "{"871C5380-42A0-1069-A2EA-08002B30309D"}" /t REG_DWORD /d 1 /f
        3⤵
          PID:596
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu /v "{"871C5380-42A0-1069-A2EA-08002B30309D"}" /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu /v "{"871C5380-42A0-1069-A2EA-08002B30309D"}" /t REG_DWORD /d 1 /f
          3⤵
            PID:1520

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Q0EV64D9.txt

        Filesize

        603B

        MD5

        75f3067412811ee15ca313cf58641dac

        SHA1

        fd528ae69feed9fb39798ea935e050ab0349dfc4

        SHA256

        45e23134357aac5fcfe0d90386c415dfffeaef29b85892390d56426278d52ebd

        SHA512

        35aad48c6b287603289b8355881439d79100545460d596babbfd646913afffca960399bde6522a00640ee1b70bac85d8658e43b3144ead06e13439fdf42961e4

      • C:\Windows\SysWOW64\WinNtServer.exe

        Filesize

        884KB

        MD5

        671400daf9dffd0fef008e31b0a7578a

        SHA1

        b71ea23f5fb36177f9c6643ff412ab86749afcc9

        SHA256

        26fa317b9720bbae94fdc0ee24de03e9078e18f569cde12f7a7a1919e045e937

        SHA512

        ae50e9634a988c4c9103ccba614bd3d323f057bdb0acbe2fb6cab869ef08f7037e48a17a3e91a0a2fbb2362a39f3ddefc977d9ab89d16e91abddcae7fb207afa

      • memory/1140-54-0x0000000075091000-0x0000000075093000-memory.dmp

        Filesize

        8KB