Analysis

  • max time kernel
    148s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2022 04:48

General

  • Target

    240b8caa66100e6055321b904b19fe9eb7ff2d9dc84732f886d0a8ce06e25827.exe

  • Size

    1.2MB

  • MD5

    7b159c899ab5c3fdeb2a0a0aebfe280b

  • SHA1

    b80f784e5e7b0f8d44e63a01f0221b429fc5afdc

  • SHA256

    240b8caa66100e6055321b904b19fe9eb7ff2d9dc84732f886d0a8ce06e25827

  • SHA512

    659c3c3d2859086bd901978f7ab8381eff312f161c41634b07b0c80fde395920a7142a81e26756c927f70bfd5d6cf4c7ae6df0e2bb7e297a7dc5206fefa3dba9

  • SSDEEP

    12288:/z7PzGXyhTE3xn8QLHxqr7pCDRFLP7uNrGuXyA9GSEXFBckIR:/z7bGXyh6xntLRqvpCTLP7s7RQlcNR

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\240b8caa66100e6055321b904b19fe9eb7ff2d9dc84732f886d0a8ce06e25827.exe
    "C:\Users\Admin\AppData\Local\Temp\240b8caa66100e6055321b904b19fe9eb7ff2d9dc84732f886d0a8ce06e25827.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe http://www.v258.net/list/list16.html?mmm
      2⤵
        PID:1676
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\8VOHo.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Windows\SysWOW64\expand.exe
          expand.exe "C:\Users\Admin\AppData\Local\Temp\ico.cab" -F:*.* "C:\progra~1\ico"
          3⤵
          • Drops file in Program Files directory
          • Drops file in Windows directory
          PID:1628
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.q22.cc/?ukt
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:628 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1880
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.v921.com/?uk
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:780 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:528
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.779dh.com/?kj
        2⤵
          PID:1512
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:572
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.v258.net/list/list16.html?mmm
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1300
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:2
            3⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1156

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        60KB

        MD5

        d15aaa7c9be910a9898260767e2490e1

        SHA1

        2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

        SHA256

        f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

        SHA512

        7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        cc64c7d062f56a476fefc635cd560e90

        SHA1

        4266149eb432bf006240e6defcaaaff66408e647

        SHA256

        26eaecf7f75634bdfa8b78edf8d5b161adc99b3e229fccfff82a40f504d3565c

        SHA512

        f658e2a603177a50c2cb613a155a9fd7328a510223cbe4001e26899831c4357b1f010795c03bad10d842abdcc9c25fc7b1aaf6a0f874b469f757f9847038b1bb

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A4FF60D1-4BAE-11ED-8C25-6AB3F8C7EA51}.dat

        Filesize

        3KB

        MD5

        b3309afda3774d54fdf121640cd9df4c

        SHA1

        cbf4404a10755f6f66ba140bf6f752b6b2fee4c4

        SHA256

        63f0bc259006dc8f90a36347ec242d9d9457111e9e95e8c452ecdf70db4b533c

        SHA512

        d1138b2463a0f5ce2fe71b97af70036c4fb2afb3e57ffc78d2602b1271093be5a84dc85bc5cadc939e98c7dbf237ebe862d2d0e05fe8bdfe99457592b3e40850

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A4FF87E1-4BAE-11ED-8C25-6AB3F8C7EA51}.dat

        Filesize

        3KB

        MD5

        04b6303016fded0b508683ab3e9e592d

        SHA1

        2fa486e182a7cd9d8e9ed20ce687f215f0442758

        SHA256

        f3d98de241eda5df85cd5a6b22b7d3adad4c00dc7c5df30254c428ed43e35499

        SHA512

        3420155e40dbde0ce0a397c8bf1bfecfa0783605207780f4e6e099dfd1d5c8e0807868547d1961a0dcdce3352d45908f8d8ea49a811f53a142927b9fb59e1741

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A4FF87E1-4BAE-11ED-8C25-6AB3F8C7EA51}.dat

        Filesize

        5KB

        MD5

        76d529771e45cc43e5c61d5dde57943d

        SHA1

        0bf1fe451c9135ce8ec7bdb66fa4225fc26ebc11

        SHA256

        e3b92c854492e42acdc47dd266f5a99e1bcfe9fe15cdd292fa010afa3ac34127

        SHA512

        72fa6a47029c68addef2c19bf6d232f21ceebbedc1e406b5899fa907bd15e3afb1227ff139848106dd3e1155bf550bea8af32dcd60849163f88b386784b88903

      • C:\Users\Admin\AppData\Local\Temp\8VOHo.bat

        Filesize

        98B

        MD5

        ada787702460241a372c495dc53dbdcf

        SHA1

        da7d65ec9541fe9ed13b3531f38202f83b0ac96d

        SHA256

        0d0f600f95192d2d602dbda346c4e08745295f331f5a0349deae21705367b850

        SHA512

        c86091735b855691c89c7946145591dec6a6a6a36a2438d392587a9cc1f2d85c1ebe44fcff1cc9d94271a24ebbc2ca38639577a6f5c592e9e10517da26572708

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LR4I2MLB.txt

        Filesize

        537B

        MD5

        3f1b708008393be315d7b4f63668c022

        SHA1

        94a8f50dbd34a8ab91041bea105913b438f2d815

        SHA256

        5656bcb599468a36db587b839801da4b8f9ea7e7fb419b6be77c01436e157dd2

        SHA512

        cf8111086d20e939e43141dd8c01a8769588e056e8a9220ec2e98c062acb32eb9bf6d6e93f88dd0d827b8a392c19e1ae581683e2dd583be287c1b5c8ed967f59

      • \??\c:\users\admin\appdata\local\temp\ico.cab

        Filesize

        20KB

        MD5

        1319e9998cedc513c68fa6d590b6ad63

        SHA1

        ae95b333e88a13886994f320f5dfb4856168a710

        SHA256

        9a5b18efe243fbe9b9b0be3674a24080e9210436986988f3f85a4007905083bb

        SHA512

        d4052a899c6c310296e2f5fdf6c2031c22d2644be620cb34ddcc6b59789d82a6462daaeb34466c568be48ee975c4a5ab43143eab0792312a6cd0d49f9fbd8d3f

      • memory/572-63-0x000007FEFC431000-0x000007FEFC433000-memory.dmp

        Filesize

        8KB

      • memory/1116-67-0x0000000000400000-0x0000000000538000-memory.dmp

        Filesize

        1.2MB

      • memory/1116-54-0x0000000000400000-0x0000000000538000-memory.dmp

        Filesize

        1.2MB

      • memory/1116-55-0x0000000076681000-0x0000000076683000-memory.dmp

        Filesize

        8KB

      • memory/1676-59-0x0000000074F61000-0x0000000074F63000-memory.dmp

        Filesize

        8KB